Home » Linux, vulnerability

Bypass security restrictions in the Linux Kernel

28 February 2009 19 views No Comment

The vulnerability allows a local attacker to bypass security restrictions on the target system. The vulnerability exists due to an error in verifying the input data in the processing of signals sent to child process via a call “clone ()” using the flag “CLONE_PARENT”. The vulnerability exists due to an error in verifying the input data in the processing of signals sent to child process via a call “clone ()” using the flag “CLONE_PARENT”. An attacker could, for example, to kill the parent process with higher privileges. An attacker could, for example, to kill the parent process with higher privileges.

Share and Enjoy:
(No Ratings Yet)
 Loading ...

Leave your response!

Add your comment below, or trackback from your own site. You can also subscribe to these comments via RSS.

Be nice. Keep it clean. Stay on topic. No spam.

You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

This is a Gravatar-enabled weblog. To get your own globally-recognized-avatar, please register at Gravatar.