CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
10.1%
The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
linux | linux_kernel | 2.2.27 | cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.36 | cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.36.1 | cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.36.2 | cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.36.3 | cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.36.4 | cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.36.5 | cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.36.6 | cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6 | cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:* |
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d25141a818383b3c3b09f065698c544a7a0ec6e7
lkml.org/lkml/2008/7/23/148
secunia.com/advisories/34981
secunia.com/advisories/35120
secunia.com/advisories/35121
secunia.com/advisories/35343
secunia.com/advisories/35656
wiki.rpath.com/Advisories:rPSA-2009-0084
www.debian.org/security/2009/dsa-1787
www.debian.org/security/2009/dsa-1800
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28
www.openwall.com/lists/oss-security/2009/04/16/2
www.openwall.com/lists/oss-security/2009/04/17/4
www.openwall.com/lists/oss-security/2009/04/21/1
www.redhat.com/support/errata/RHSA-2009-1081.html
www.securityfocus.com/archive/1/503610/100/0/threaded
www.ubuntu.com/usn/usn-793-1
bugzilla.redhat.com/show_bug.cgi?id=496031
exchange.xforce.ibmcloud.com/vulnerabilities/50386