Vulnerability Description
kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 2.6.39 |
| Redhat | Enterprise Linux | 5.0 |
| Redhat | Enterprise Linux Aus | 5.6 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 5.6 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Workstation | 5.0 |
References
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39Third Party Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://rhn.redhat.com/errata/RHSA-2011-0927.htmlThird Party Advisory
- http://www.openwall.com/lists/oss-security/2011/03/23/2Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=690028Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070ExploitPatchThird Party Advisory
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39Third Party Advisory
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://rhn.redhat.com/errata/RHSA-2011-0927.htmlThird Party Advisory
- http://www.openwall.com/lists/oss-security/2011/03/23/2Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=690028Issue TrackingThird Party Advisory
- https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070ExploitPatchThird Party Advisory
FAQ
What is CVE-2011-1182?
CVE-2011-1182 is a vulnerability with a CVSS score of 3.6 (LOW). kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
How severe is CVE-2011-1182?
CVE-2011-1182 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1182?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux, Redhat Enterprise Linux Aus, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus.