The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T22:14:27.057Z
Reserved: 2011-02-14T00:00:00
Link: CVE-2011-1020

No data.

Status : Modified
Published: 2011-02-28T16:00:01.930
Modified: 2024-11-21T01:25:20.650
Link: CVE-2011-1020
