Bypass security restrictions in the Linux Kernel
28 February 2009
19 views
No Comment
The vulnerability allows a local attacker to bypass security restrictions on the target system. The vulnerability exists due to an error in verifying the input data in the processing of signals sent to child process via a call “clone ()” using the flag “CLONE_PARENT”. The vulnerability exists due to an error in verifying the input data in the processing of signals sent to child process via a call “clone ()” using the flag “CLONE_PARENT”. An attacker could, for example, to kill the parent process with higher privileges. An attacker could, for example, to kill the parent process with higher privileges.
Leave your response!