Skip to navigation

CVE Database

CVE-2011-2495

Impact: Low
Public: 2011-06-21
Bugzilla: 716825: CVE-2011-2495 kernel: /proc/PID/io infoleak
IAVA: 2012-A-0020

Details

The MITRE CVE dictionary describes this issue as:

fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password.

Find out more about CVE-2011-2495 from the MITRE CVE dictionary and NIST NVD.

Statement

This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1212.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.

CVSS v2 metrics

Base Score: 2.1
Base Metrics: AV:L/AC:L/Au:N/C:P/I:N/A:N
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2011:1253 September 12, 2011
Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel) RHSA-2011:1813 December 13, 2011
Red Hat Enterprise Linux version 5 (kernel) RHSA-2011:1212 September 06, 2011
Red Hat Enterprise Linux version 6 (kernel) RHSA-2011:1189 August 23, 2011

External References

Acknowledgements

Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.