Описание
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
Отчет
Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via RHSA-2012:0007, RHSA-2011:1530 and RHSA-2011:1253 respectively.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 4 | kernel | Affected | ||
Red Hat Enterprise MRG 1 | realtime-kernel | Affected | ||
Red Hat Enterprise Linux 5 | kernel | Fixed | RHSA-2012:0007 | 10.01.2012 |
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2011:1530 | 05.12.2011 |
Red Hat Enterprise Linux 6.1 EUS - Server Only | kernel | Fixed | RHSA-2012:0116 | 15.02.2012 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2011:1253 | 12.09.2011 |
Показывать по
Дополнительная информация
Статус:
3.6 Low
CVSS2
Связанные уязвимости
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
The proc filesystem implementation in the Linux kernel 2.6.37 and earl ...
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
ELSA-2011-1530: Oracle Linux 6 kernel security, bug fix and enhancement update (MODERATE)
3.6 Low
CVSS2