CVE-2011-1020
Publication date 28 February 2011
Last updated 24 July 2024
Ubuntu priority
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
From the Ubuntu Security Team
It was discovered that the /proc filesystem did not correctly handle permission changes when programs executed. A local attacker could hold open files to examine details about programs running with higher privileges, potentially increasing the chances of exploiting additional vulnerabilities.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-lts-backport-oneiric | ||
linux-mvl-dove | ||
linux-ti-omap4 | ||
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1205-1
- Linux kernel (Maverick backport) vulnerabilities
- 13 September 2011
- USN-1189-1
- Linux kernel vulnerabilities
- 19 August 2011
- USN-1211-1
- Linux kernel vulnerabilities
- 21 September 2011
- USN-1202-1
- Linux kernel (OMAP4) vulnerabilities
- 13 September 2011
- USN-1203-1
- Linux kernel (Marvel DOVE) vulnerabilities
- 13 September 2011
- USN-1218-1
- Linux kernel vulnerabilities
- 29 September 2011
- USN-1204-1
- Linux kernel (i.MX51) vulnerabilities
- 13 September 2011
- USN-1208-1
- Linux kernel (Marvel DOVE) vulnerabilities
- 14 September 2011
- USN-1256-1
- Linux kernel (Natty backport) vulnerabilities
- 9 November 2011
- USN-1201-1
- Linux kernel vulnerabilities
- 13 September 2011
- USN-1212-1
- Linux kernel (OMAP4) vulnerabilities
- 21 September 2011
- USN-1216-1
- Linux kernel (EC2) vulnerabilities
- 26 September 2011