CVE-2011-2495
Publication date 3 October 2011
Last updated 24 July 2024
Ubuntu priority
fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password.
From the Ubuntu Security Team
Vasiliy Kulikov discovered that /proc/PID/io did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-lts-backport-oneiric | ||
linux-mvl-dove | ||
linux-ti-omap4 | ||
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1241-1
- Linux kernel (i.MX51) vulnerabilities
- 25 October 2011
- USN-1243-1
- Linux kernel vulnerabilities
- 25 October 2011
- USN-1253-1
- Linux kernel vulnerabilities
- 8 November 2011
- USN-1239-1
- Linux kernel (EC2) vulnerabilities
- 25 October 2011
- USN-1281-1
- Linux (OMAP4) vulnerabilities
- 24 November 2011
- USN-1285-1
- Linux kernel vulnerabilities
- 29 November 2011
- USN-1279-1
- Linux (Natty backport) vulnerabilities
- 24 November 2011
- USN-1236-1
- Linux kernel vulnerabilities
- 20 October 2011
- USN-1244-1
- Linux kernel (OMAP4) vulnerabilities
- 25 October 2011
- USN-1240-1
- Linux kernel (Marvell DOVE) vulnerabilities
- 25 October 2011
- USN-1245-1
- Linux kernel (Marvell DOVE) vulnerabilities
- 25 October 2011
- USN-1242-1
- Linux kernel (Maverick backport) vulnerabilities
- 25 October 2011