Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1182

Опубликовано: 23 мар. 2011
Источник: redhat
CVSS2: 3.6
EPSS Низкий

Описание

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.

Отчет

Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. This was addressed in Red Hat Enterprise Linux 5 and 6 via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-1189.html. A future kernel update in Red Hat Enterprise MRG may address this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise MRG 1realtime-kernelAffected
Red Hat Enterprise Linux 5kernelFixedRHSA-2011:092715.07.2011
Red Hat Enterprise Linux 6kernelFixedRHSA-2011:118923.08.2011
Red Hat Enterprise Linux 6.0 EUS - Server OnlykernelFixedRHSA-2011:088321.06.2011

Показывать по

Дополнительная информация

Статус:

Low

EPSS

Процентиль: 19%
0.00059
Низкий

3.6 Low

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.

nvd
больше 12 лет назад

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.

debian
больше 12 лет назад

kernel/signal.c in the Linux kernel before 2.6.39 allows local users t ...

github
около 3 лет назад

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.

oracle-oval
почти 14 лет назад

ELSA-2011-1189: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 19%
0.00059
Низкий

3.6 Low

CVSS2