Public Date:
2012-A-0148, 2012-A-0153
680358: CVE-2011-1020 kernel: no access restrictions of /proc/pid/* after setuid program exec

The MITRE CVE dictionary describes this issue as:

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

Find out more about CVE-2011-1020 from the MITRE CVE dictionary dictionary and NIST NVD.


Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle,, therefore the fix for this issue is not currently planned to be included in the future updates.

This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via RHSA-2012:0007, RHSA-2011:1530 and RHSA-2011:1253 respectively.

CVSS v2 metrics

Base Score 3.6
Base Metrics AV:L/AC:L/Au:N/C:P/I:P/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (kernel) RHSA-2012:0007 2012-01-10
Red Hat Enterprise Linux Server EUS (v. 6.1) (kernel) RHSA-2012:0116 2012-02-15
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2011:1253 2011-09-12
Red Hat Enterprise Linux 6 (kernel) RHSA-2011:1530 2011-12-05

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 1 realtime-kernel Will not fix
Red Hat Enterprise Linux 4 kernel Will not fix


Red Hat would like to thank Kees Cook for reporting this issue.
Last Modified

CVE description copyright © 2017, The MITRE Corporation