Описание
kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
Отчет
Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. This was addressed in Red Hat Enterprise Linux 5 and 6 via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-1189.html. A future kernel update in Red Hat Enterprise MRG may address this flaw.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise MRG 1 | realtime-kernel | Affected | ||
Red Hat Enterprise Linux 5 | kernel | Fixed | RHSA-2011:0927 | 15.07.2011 |
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2011:1189 | 23.08.2011 |
Red Hat Enterprise Linux 6.0 EUS - Server Only | kernel | Fixed | RHSA-2011:0883 | 21.06.2011 |
Показывать по
Дополнительная информация
Статус:
EPSS
3.6 Low
CVSS2
Связанные уязвимости
kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
kernel/signal.c in the Linux kernel before 2.6.39 allows local users t ...
kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
ELSA-2011-1189: kernel security, bug fix, and enhancement update (IMPORTANT)
EPSS
3.6 Low
CVSS2