CVE-2011-2495

Published: 03 October 2011

fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password.

From the Ubuntu security team

Vasiliy Kulikov discovered that /proc/PID/io did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 1d1221f375c94ef961ba8574ac4f85c8870ddd51
Introduced by d84f4f992cbd76e8f39c488cf0c5d123843923b1
Fixed by 293eb1e7772b25a93647c798c7b89bf26c2da2e0
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc1)