| CVE-ID |
CVE-2011-1020
|
• Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
|
| Description |
| The proc filesystem implementation in the Linux kernel 2.6.37 and
earlier does not restrict access to the /proc directory tree of a
process after this process performs an exec of a setuid program, which
allows local users to obtain sensitive information or cause a denial
of service via open, lseek, read, and write system calls.
|
| References |
|
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
|
| Assigning CNA |
| N/A |
| Date Entry Created |
| 20110214 |
Disclaimer: The entry creation date may reflect when
the CVE-ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
| Phase (Legacy) |
| Assigned (20110214) |
| Votes (Legacy) |
|
| Comments (Legacy) |
|
| Proposed (Legacy) |
| N/A |
|
This is an entry on the CVE
list, which standardizes names for security
problems. |
|
|
|
For More Information: cve@mitre.org
|