CVE-2011-1020
Publication date 28 February 2011
Last updated 24 July 2024
Ubuntu priority
Description
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
From the Ubuntu Security Team
It was discovered that the /proc filesystem did not correctly handle permission changes when programs executed. A local attacker could hold open files to examine details about programs running with higher privileges, potentially increasing the chances of exploiting additional vulnerabilities.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-lts-backport-oneiric | ||
linux-mvl-dove | ||
linux-ti-omap4 | ||
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1205-1
- Linux kernel (Maverick backport) vulnerabilities
- 13 September 2011
- USN-1189-1
- Linux kernel vulnerabilities
- 19 August 2011
- USN-1211-1
- Linux kernel vulnerabilities
- 21 September 2011
- USN-1202-1
- Linux kernel (OMAP4) vulnerabilities
- 13 September 2011
- USN-1203-1
- Linux kernel (Marvel DOVE) vulnerabilities
- 13 September 2011
- USN-1218-1
- Linux kernel vulnerabilities
- 29 September 2011
- USN-1204-1
- Linux kernel (i.MX51) vulnerabilities
- 13 September 2011
- USN-1208-1
- Linux kernel (Marvel DOVE) vulnerabilities
- 14 September 2011
- USN-1256-1
- Linux kernel (Natty backport) vulnerabilities
- 9 November 2011
- USN-1201-1
- Linux kernel vulnerabilities
- 13 September 2011
- USN-1212-1
- Linux kernel (OMAP4) vulnerabilities
- 21 September 2011
- USN-1216-1
- Linux kernel (EC2) vulnerabilities
- 26 September 2011