CVE-2011-1182

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-03-01 12:37

Updated : 2024-02-28 12:00


NVD link : CVE-2011-1182

Mitre link : CVE-2011-1182

CVE.ORG link : CVE-2011-1182


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • enterprise_linux_desktop
  • enterprise_linux_server
  • enterprise_linux_eus
  • enterprise_linux_workstation
  • enterprise_linux_aus

linux

  • linux_kernel