CVE-2011-2495

Priority
Medium
Description
fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly
restrict access to /proc/#####/io files, which allows local users to obtain
sensitive I/O statistics by polling a file, as demonstrated by discovering
the length of another user's password.
Ubuntu-Description
Vasiliy Kulikov discovered that /proc/PID/io did not enforce access
restrictions. A local attacker could exploit this to read certain
information, leading to a loss of privacy.
References
Bugs
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (3.1~rc1)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2Fixed by 1d1221f375c94ef961ba8574ac4f85c8870ddd51
Introduced by d84f4f992cbd76e8f39c488cf0c5d123843923b1Fixed by 293eb1e7772b25a93647c798c7b89bf26c2da2e0
Package
Upstream:released (3.1~rc1)
Package
Upstream:released (3.1~rc1)
More Information

Updated: 2017-08-11 23:47:40 UTC (commit 13081)