First published: Wed Mar 23 2011(Updated: )
kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.39 | |
Red Hat Enterprise Linux | =5.0 | |
redhat enterprise linux aus | =5.6 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux eus | =5.6 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1182 is classified with a moderate severity level due to its potential impact on user privilege escalation.
To fix CVE-2011-1182, it is recommended to upgrade to the Linux kernel version 2.6.39 or later.
CVE-2011-1182 affects all Linux kernel versions prior to 2.6.39.
CVE-2011-1182 is primarily a local vulnerability, meaning it requires local access to exploit.
CVE-2011-1182 involves the sigqueueinfo system call which can be manipulated to spoof the sender's uid and pid.