You are here

CVE-2011-2495

Vincent (CVE) Danen's picture
fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password.

Details Source

Mitre

Statement

This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1212.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.

Public Date

2011-06-21 00:00:00

Impact

Low

Bugzilla

CVE-2011-2495 kernel: /proc/PID/io infoleak

Bugzilla ID

716 825

CVSS Status

verified

Base Score

2.10

Base Metrics

AV:L/AC:L/Au:N/C:P/I:N/A:N

Acknowledgements

Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.

IAVA

2012-A-0020

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (kernel) RHSA-2011:1189 2011-08-23
Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel) RHSA-2011:1813 2011-12-13
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2011:1253 2011-09-12
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:1212 2011-09-06

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2.0 realtime-kernel Affected
Red Hat Enterprise Linux 4 kernel Will not fix