Lucene search

K
nvd[email protected]NVD:CVE-2009-1338
HistoryApr 22, 2009 - 3:30 p.m.

CVE-2009-1338

2009-04-2215:30:00
CWE-264
web.nvd.nist.gov
7

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

4.5

Confidence

High

EPSS

0

Percentile

10.1%

The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.

Affected configurations

Nvd
Node
linuxlinux_kernelRange2.6.27.21
OR
linuxlinux_kernelMatch2.2.27
OR
linuxlinux_kernelMatch2.4.36
OR
linuxlinux_kernelMatch2.4.36.1
OR
linuxlinux_kernelMatch2.4.36.2
OR
linuxlinux_kernelMatch2.4.36.3
OR
linuxlinux_kernelMatch2.4.36.4
OR
linuxlinux_kernelMatch2.4.36.5
OR
linuxlinux_kernelMatch2.4.36.6
OR
linuxlinux_kernelMatch2.6
OR
linuxlinux_kernelMatch2.6.18
OR
linuxlinux_kernelMatch2.6.18rc1
OR
linuxlinux_kernelMatch2.6.18rc2
OR
linuxlinux_kernelMatch2.6.18rc3
OR
linuxlinux_kernelMatch2.6.18rc4
OR
linuxlinux_kernelMatch2.6.18rc5
OR
linuxlinux_kernelMatch2.6.18rc6
OR
linuxlinux_kernelMatch2.6.18rc7
OR
linuxlinux_kernelMatch2.6.19.4
OR
linuxlinux_kernelMatch2.6.19.5
OR
linuxlinux_kernelMatch2.6.19.6
OR
linuxlinux_kernelMatch2.6.19.7
OR
linuxlinux_kernelMatch2.6.20.16
OR
linuxlinux_kernelMatch2.6.20.17
OR
linuxlinux_kernelMatch2.6.20.18
OR
linuxlinux_kernelMatch2.6.20.19
OR
linuxlinux_kernelMatch2.6.20.20
OR
linuxlinux_kernelMatch2.6.20.21
OR
linuxlinux_kernelMatch2.6.21.5
OR
linuxlinux_kernelMatch2.6.21.6
OR
linuxlinux_kernelMatch2.6.21.7
OR
linuxlinux_kernelMatch2.6.22
OR
linuxlinux_kernelMatch2.6.22.1
OR
linuxlinux_kernelMatch2.6.22.2
OR
linuxlinux_kernelMatch2.6.22.8
OR
linuxlinux_kernelMatch2.6.22.9
OR
linuxlinux_kernelMatch2.6.22.10
OR
linuxlinux_kernelMatch2.6.22.11
OR
linuxlinux_kernelMatch2.6.22.12
OR
linuxlinux_kernelMatch2.6.22.13
OR
linuxlinux_kernelMatch2.6.22.14
OR
linuxlinux_kernelMatch2.6.22.15
OR
linuxlinux_kernelMatch2.6.22.17
OR
linuxlinux_kernelMatch2.6.22.18
OR
linuxlinux_kernelMatch2.6.22.19
OR
linuxlinux_kernelMatch2.6.22.20
OR
linuxlinux_kernelMatch2.6.22.21
OR
linuxlinux_kernelMatch2.6.22.22
OR
linuxlinux_kernelMatch2.6.22_rc1
OR
linuxlinux_kernelMatch2.6.22_rc7
OR
linuxlinux_kernelMatch2.6.23
OR
linuxlinux_kernelMatch2.6.23.8
OR
linuxlinux_kernelMatch2.6.23.9
OR
linuxlinux_kernelMatch2.6.23.10
OR
linuxlinux_kernelMatch2.6.23.11
OR
linuxlinux_kernelMatch2.6.23.12
OR
linuxlinux_kernelMatch2.6.23.13
OR
linuxlinux_kernelMatch2.6.23.15
OR
linuxlinux_kernelMatch2.6.23.16
OR
linuxlinux_kernelMatch2.6.23.17
OR
linuxlinux_kernelMatch2.6.23_rc1
OR
linuxlinux_kernelMatch2.6.24
OR
linuxlinux_kernelMatch2.6.24.1
OR
linuxlinux_kernelMatch2.6.24.2
OR
linuxlinux_kernelMatch2.6.24.3
OR
linuxlinux_kernelMatch2.6.24.4
OR
linuxlinux_kernelMatch2.6.24.5
OR
linuxlinux_kernelMatch2.6.24.6
OR
linuxlinux_kernelMatch2.6.24.7
OR
linuxlinux_kernelMatch2.6.24_rc1
OR
linuxlinux_kernelMatch2.6.24_rc4
OR
linuxlinux_kernelMatch2.6.24_rc5
OR
linuxlinux_kernelMatch2.6.25
OR
linuxlinux_kernelMatch2.6.25x86_64
OR
linuxlinux_kernelMatch2.6.25.1
OR
linuxlinux_kernelMatch2.6.25.1x86_64
OR
linuxlinux_kernelMatch2.6.25.2
OR
linuxlinux_kernelMatch2.6.25.2x86_64
OR
linuxlinux_kernelMatch2.6.25.3
OR
linuxlinux_kernelMatch2.6.25.3x86_64
OR
linuxlinux_kernelMatch2.6.25.4
OR
linuxlinux_kernelMatch2.6.25.4x86_64
OR
linuxlinux_kernelMatch2.6.25.5
OR
linuxlinux_kernelMatch2.6.25.5x86_64
OR
linuxlinux_kernelMatch2.6.25.6
OR
linuxlinux_kernelMatch2.6.25.6x86_64
OR
linuxlinux_kernelMatch2.6.25.7
OR
linuxlinux_kernelMatch2.6.25.7x86_64
OR
linuxlinux_kernelMatch2.6.25.8
OR
linuxlinux_kernelMatch2.6.25.8x86_64
OR
linuxlinux_kernelMatch2.6.25.9
OR
linuxlinux_kernelMatch2.6.25.9x86_64
OR
linuxlinux_kernelMatch2.6.25.10
OR
linuxlinux_kernelMatch2.6.25.10x86_64
OR
linuxlinux_kernelMatch2.6.25.11
OR
linuxlinux_kernelMatch2.6.25.11x86_64
OR
linuxlinux_kernelMatch2.6.25.12
OR
linuxlinux_kernelMatch2.6.25.12x86_64
OR
linuxlinux_kernelMatch2.6.25.13
OR
linuxlinux_kernelMatch2.6.25.14
OR
linuxlinux_kernelMatch2.6.25.15
OR
linuxlinux_kernelMatch2.6.25.16
OR
linuxlinux_kernelMatch2.6.25.17
OR
linuxlinux_kernelMatch2.6.26
OR
linuxlinux_kernelMatch2.6.26.1
OR
linuxlinux_kernelMatch2.6.26.2
OR
linuxlinux_kernelMatch2.6.26.3
OR
linuxlinux_kernelMatch2.6.26.4
OR
linuxlinux_kernelMatch2.6.26.5
OR
linuxlinux_kernelMatch2.6.27
OR
linuxlinux_kernelMatch2.6.27.1
OR
linuxlinux_kernelMatch2.6.27.2
OR
linuxlinux_kernelMatch2.6.27.3
OR
linuxlinux_kernelMatch2.6.27.4
OR
linuxlinux_kernelMatch2.6.27.5
OR
linuxlinux_kernelMatch2.6.27.6
OR
linuxlinux_kernelMatch2.6.27.7
OR
linuxlinux_kernelMatch2.6.27.8
OR
linuxlinux_kernelMatch2.6.27.9
OR
linuxlinux_kernelMatch2.6.27.10
OR
linuxlinux_kernelMatch2.6.27.11
OR
linuxlinux_kernelMatch2.6.27.12
OR
linuxlinux_kernelMatch2.6.27.13
OR
linuxlinux_kernelMatch2.6.27.14
OR
linuxlinux_kernelMatch2.6.27.15
OR
linuxlinux_kernelMatch2.6.27.16
OR
linuxlinux_kernelMatch2.6.27.17
OR
linuxlinux_kernelMatch2.6.27.18
OR
linuxlinux_kernelMatch2.6.27.19
OR
linuxlinux_kernelMatch2.6.27.20

References

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

AI Score

4.5

Confidence

High

EPSS

0

Percentile

10.1%