|Bugzilla:||716825: CVE-2011-2495 kernel: /proc/PID/io infoleak|
The MITRE CVE dictionary describes this issue as:
fs/proc/base.c in the Linux kernel before 220.127.116.11 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password.
This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1212.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|MRG Grid for RHEL 6 Server v.2 (kernel-rt)||RHSA-2011:1253||September 12, 2011|
|Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel)||RHSA-2011:1813||December 13, 2011|
|Red Hat Enterprise Linux version 5 (kernel)||RHSA-2011:1212||September 06, 2011|
|Red Hat Enterprise Linux version 6 (kernel)||RHSA-2011:1189||August 23, 2011|
Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.