Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-1182

Опубликовано: 01 мар. 2013
Источник: debian

Описание

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.38-2package

Связанные уязвимости

ubuntu
почти 13 лет назад

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.

redhat
почти 15 лет назад

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.

nvd
почти 13 лет назад

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.

github
больше 3 лет назад

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.

oracle-oval
больше 14 лет назад

ELSA-2011-1189: kernel security, bug fix, and enhancement update (IMPORTANT)