First published: Mon Jun 27 2011(Updated: )
/proc/PID/io may be used for gathering private information. E.g. for openssh and vsftpd daemons wchars/rchars may be used to learn the precise password length. [0/2] restrict statistics information to user <a href="https://lkml.org/lkml/2011/6/24/88">https://lkml.org/lkml/2011/6/24/88</a> [1/2] proc: restrict access to /proc/PID/io (<a href="https://access.redhat.com/security/cve/CVE-2011-2495">CVE-2011-2495</a>) <a href="https://patchwork.kernel.org/patch/916032/">https://patchwork.kernel.org/patch/916032/</a> [2/2] taskstats: restrict access to user (<a href="https://access.redhat.com/security/cve/CVE-2011-2494">CVE-2011-2494</a>) <a href="https://patchwork.kernel.org/patch/916042/">https://patchwork.kernel.org/patch/916042/</a> taskstats authorized_keys presence infoleak PoC <a href="http://seclists.org/oss-sec/2011/q2/659">http://seclists.org/oss-sec/2011/q2/659</a> Acknowledgements: Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | =2.6.39-rc7 | |
Linux kernel | =2.6.39-rc6 | |
Linux kernel | =2.6.39-rc4 | |
Linux kernel | =2.6.39.1 | |
Linux kernel | =2.6.39-rc1 | |
Linux kernel | =2.6.39-rc3 | |
Linux kernel | <=2.6.39.3 | |
Linux kernel | =2.6.39 | |
Linux kernel | =2.6.39-rc2 | |
Linux kernel | =2.6.39.2 | |
Linux kernel | =2.6.39-rc5 | |
Linux Kernel | <=2.6.39.3 | |
Linux Kernel | =2.6.39 | |
Linux Kernel | =2.6.39-rc1 | |
Linux Kernel | =2.6.39-rc2 | |
Linux Kernel | =2.6.39-rc3 | |
Linux Kernel | =2.6.39-rc4 | |
Linux Kernel | =2.6.39-rc5 | |
Linux Kernel | =2.6.39-rc6 | |
Linux Kernel | =2.6.39-rc7 | |
Linux Kernel | =2.6.39.1 | |
Linux Kernel | =2.6.39.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2495 is considered a medium severity vulnerability due to its potential to leak sensitive information.
To fix CVE-2011-2495, upgrade the Linux kernel to a version greater than or equal to 2.6.39.4.
CVE-2011-2495 affects specific versions of the Linux kernel, particularly version 2.6.39 and its release candidates.
CVE-2011-2495 is primarily a local vulnerability, requiring access to the affected system to exploit.
CVE-2011-2495 can potentially leak sensitive information such as the length of the passwords being used by processes running on the system.