ID

VAR-201206-0279


CVE

CVE-2011-2495


TITLE

Linux Kernel ‘ fs/proc/base.c ’ Permissions and Access Control Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201108-548

DESCRIPTION

fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password. Hitachi JP1 products are prone to a cross-site scripting vulnerability because they fail to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. The following products are affected: JP1/IT Resource Management - Manager JP1/IT Service Level Management - Manager. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Hitachi JP1/IT Service Level Management Unspecified Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA47804 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47804/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47804 RELEASE DATE: 2012-01-31 DISCUSS ADVISORY: http://secunia.com/advisories/47804/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47804/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47804 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Hitachi JP1/IT Service Level Management, which can be exploited by malicious people to conduct cross-site scripting attacks. Certain unspecified input is not properly sanitised before being returned to the user. The vulnerability is reported in version 09-50. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: Hitachi (English): http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-005/index.html Hitachi (Japanese): http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS12-005/index.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2011:1189-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1189.html Issue date: 2011-08-23 CVE Names: CVE-2011-1182 CVE-2011-1576 CVE-2011-1593 CVE-2011-1776 CVE-2011-1898 CVE-2011-2183 CVE-2011-2213 CVE-2011-2491 CVE-2011-2492 CVE-2011-2495 CVE-2011-2497 CVE-2011-2517 CVE-2011-2689 CVE-2011-2695 ===================================================================== 1. Summary: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 3. Description: Security issues: * Using PCI passthrough without interrupt remapping support allowed KVM guests to generate MSI interrupts and thus potentially inject traps. A privileged guest user could use this flaw to crash the host or possibly escalate their privileges on the host. The fix for this issue can prevent PCI passthrough working and guests starting. Refer to Red Hat Bugzilla bug 715555 for details. (CVE-2011-1898, Important) * Flaw in the client-side NLM implementation could allow a local, unprivileged user to cause a denial of service. (CVE-2011-2491, Important) * Integer underflow in the Bluetooth implementation could allow a remote attacker to cause a denial of service or escalate their privileges by sending a specially-crafted request to a target system via Bluetooth. (CVE-2011-2497, Important) * Buffer overflows in the netlink-based wireless configuration interface implementation could allow a local user, who has the CAP_NET_ADMIN capability, to cause a denial of service or escalate their privileges on systems that have an active wireless interface. (CVE-2011-2517, Important) * Flaw in the way the maximum file offset was handled for ext4 file systems could allow a local, unprivileged user to cause a denial of service. (CVE-2011-2695, Important) * Flaw allowed napi_reuse_skb() to be called on VLAN packets. An attacker on the local network could use this flaw to send crafted packets to a target, possibly causing a denial of service. (CVE-2011-1576, Moderate) * Integer signedness error in next_pidmap() could allow a local, unprivileged user to cause a denial of service. (CVE-2011-1593, Moderate) * Race condition in the memory merging support (KSM) could allow a local, unprivileged user to cause a denial of service. KSM is off by default, but on systems running VDSM, or on KVM hosts, it is likely turned on by the ksm/ksmtuned services. (CVE-2011-2183, Moderate) * Flaw in inet_diag_bc_audit() could allow a local, unprivileged user to cause a denial of service. (CVE-2011-2213, Moderate) * Flaw in the way space was allocated in the Global File System 2 (GFS2) implementation. If the file system was almost full, and a local, unprivileged user made an fallocate() request, it could result in a denial of service. Setting quotas to prevent users from using all available disk space would prevent exploitation of this flaw. (CVE-2011-2689, Moderate) * Local, unprivileged users could send signals via the sigqueueinfo system call, with si_code set to SI_TKILL and with spoofed process and user IDs, to other processes. This flaw does not allow existing permission checks to be bypassed; signals can only be sent if your privileges allow you to already do so. (CVE-2011-1182, Low) * Heap overflow in the EFI GUID Partition Table (GPT) implementation could allow a local attacker to cause a denial of service by mounting a disk containing crafted partition tables. (CVE-2011-1776, Low) * Structure padding in two structures in the Bluetooth implementation was not initialized properly before being copied to user-space, possibly allowing local, unprivileged users to leak kernel stack memory to user-space. (CVE-2011-2492, Low) * /proc/[PID]/io is world-readable by default. Previously, these files could be read without any further restrictions. A local, unprivileged user could read these files, belonging to other, possibly privileged processes to gather confidential information, such as the length of a password used in a process. (CVE-2011-2495, Low) Red Hat would like to thank Vasily Averin for reporting CVE-2011-2491; Dan Rosenberg for reporting CVE-2011-2497 and CVE-2011-2213; Ryan Sweat for reporting CVE-2011-1576; Robert Swiecki for reporting CVE-2011-1593; Andrea Righi for reporting CVE-2011-2183; Julien Tinnes of the Google Security Team for reporting CVE-2011-1182; Timo Warns for reporting CVE-2011-1776; Marek Kroemeke and Filip Palian for reporting CVE-2011-2492; and Vasiliy Kulikov of Openwall for reporting CVE-2011-2495. 4. Solution: Refer to the Technical Notes, available shortly from the link in the References, for bug fix and enhancement details. Users should upgrade to these updated packages, which contain backported patches to correct these issues, and fix the bugs and add the enhancements noted in the Technical Notes. The system must be rebooted for this update to take effect. Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. 5. Bugs fixed (http://bugzilla.redhat.com/): 690028 - CVE-2011-1182 kernel signal spoofing issue 695173 - CVE-2011-1576 kernel: net: Fix memory leak/corruption on VLAN GRO_DROP 697822 - CVE-2011-1593 kernel: proc: signedness issue in next_pidmap() 703019 - CVE-2011-2492 kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace 703026 - CVE-2011-1776 kernel: validate size of EFI GUID partition entries 709393 - CVE-2011-2491 kernel: rpc task leak after flock()ing NFS share 710338 - CVE-2011-2183 kernel: ksm: race between ksmd and exiting task 713827 - Parallel port issue in RHEL 6.0 server 714536 - CVE-2011-2213 kernel: inet_diag: insufficient validation 714982 - GFS2: Update to rhel6.1 broke dovecot writing to a gfs2 filesystem 715555 - CVE-2011-1898 virt: VT-d (PCI passthrough) MSI trap injection 716539 - bump domain memory limits [6.1.z] 716805 - CVE-2011-2497 kernel: bluetooth: buffer overflow in l2cap config request 716825 - CVE-2011-2495 kernel: /proc/PID/io infoleak 718152 - CVE-2011-2517 kernel: nl80211: missing check for valid SSID size in scan operations 720861 - CVE-2011-2689 kernel: gfs2: make sure fallocate bytes is a multiple of blksize 722557 - CVE-2011-2695 kernel: ext4: kernel panic when writing data to the last block of sparse file 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/kernel-2.6.32-131.12.1.el6.src.rpm i386: kernel-2.6.32-131.12.1.el6.i686.rpm kernel-debug-2.6.32-131.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-131.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-131.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-131.12.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-131.12.1.el6.i686.rpm kernel-devel-2.6.32-131.12.1.el6.i686.rpm kernel-headers-2.6.32-131.12.1.el6.i686.rpm perf-2.6.32-131.12.1.el6.i686.rpm perf-debuginfo-2.6.32-131.12.1.el6.i686.rpm noarch: kernel-doc-2.6.32-131.12.1.el6.noarch.rpm kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm x86_64: kernel-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-131.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-131.12.1.el6.x86_64.rpm kernel-devel-2.6.32-131.12.1.el6.x86_64.rpm kernel-headers-2.6.32-131.12.1.el6.x86_64.rpm perf-2.6.32-131.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/kernel-2.6.32-131.12.1.el6.src.rpm noarch: kernel-doc-2.6.32-131.12.1.el6.noarch.rpm kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm x86_64: kernel-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-131.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-131.12.1.el6.x86_64.rpm kernel-devel-2.6.32-131.12.1.el6.x86_64.rpm kernel-headers-2.6.32-131.12.1.el6.x86_64.rpm perf-2.6.32-131.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/kernel-2.6.32-131.12.1.el6.src.rpm i386: kernel-2.6.32-131.12.1.el6.i686.rpm kernel-debug-2.6.32-131.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-131.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-131.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-131.12.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-131.12.1.el6.i686.rpm kernel-devel-2.6.32-131.12.1.el6.i686.rpm kernel-headers-2.6.32-131.12.1.el6.i686.rpm perf-2.6.32-131.12.1.el6.i686.rpm perf-debuginfo-2.6.32-131.12.1.el6.i686.rpm noarch: kernel-doc-2.6.32-131.12.1.el6.noarch.rpm kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm ppc64: kernel-2.6.32-131.12.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-131.12.1.el6.ppc64.rpm kernel-debug-2.6.32-131.12.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-131.12.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-131.12.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-131.12.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-131.12.1.el6.ppc64.rpm kernel-devel-2.6.32-131.12.1.el6.ppc64.rpm kernel-headers-2.6.32-131.12.1.el6.ppc64.rpm perf-2.6.32-131.12.1.el6.ppc64.rpm perf-debuginfo-2.6.32-131.12.1.el6.ppc64.rpm s390x: kernel-2.6.32-131.12.1.el6.s390x.rpm kernel-debug-2.6.32-131.12.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-131.12.1.el6.s390x.rpm kernel-debug-devel-2.6.32-131.12.1.el6.s390x.rpm kernel-debuginfo-2.6.32-131.12.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-131.12.1.el6.s390x.rpm kernel-devel-2.6.32-131.12.1.el6.s390x.rpm kernel-headers-2.6.32-131.12.1.el6.s390x.rpm kernel-kdump-2.6.32-131.12.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-131.12.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-131.12.1.el6.s390x.rpm perf-2.6.32-131.12.1.el6.s390x.rpm perf-debuginfo-2.6.32-131.12.1.el6.s390x.rpm x86_64: kernel-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-131.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-131.12.1.el6.x86_64.rpm kernel-devel-2.6.32-131.12.1.el6.x86_64.rpm kernel-headers-2.6.32-131.12.1.el6.x86_64.rpm perf-2.6.32-131.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/kernel-2.6.32-131.12.1.el6.src.rpm i386: kernel-2.6.32-131.12.1.el6.i686.rpm kernel-debug-2.6.32-131.12.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-131.12.1.el6.i686.rpm kernel-debug-devel-2.6.32-131.12.1.el6.i686.rpm kernel-debuginfo-2.6.32-131.12.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-131.12.1.el6.i686.rpm kernel-devel-2.6.32-131.12.1.el6.i686.rpm kernel-headers-2.6.32-131.12.1.el6.i686.rpm perf-2.6.32-131.12.1.el6.i686.rpm perf-debuginfo-2.6.32-131.12.1.el6.i686.rpm noarch: kernel-doc-2.6.32-131.12.1.el6.noarch.rpm kernel-firmware-2.6.32-131.12.1.el6.noarch.rpm x86_64: kernel-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-131.12.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-131.12.1.el6.x86_64.rpm kernel-devel-2.6.32-131.12.1.el6.x86_64.rpm kernel-headers-2.6.32-131.12.1.el6.x86_64.rpm perf-2.6.32-131.12.1.el6.x86_64.rpm perf-debuginfo-2.6.32-131.12.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1182.html https://www.redhat.com/security/data/cve/CVE-2011-1576.html https://www.redhat.com/security/data/cve/CVE-2011-1593.html https://www.redhat.com/security/data/cve/CVE-2011-1776.html https://www.redhat.com/security/data/cve/CVE-2011-1898.html https://www.redhat.com/security/data/cve/CVE-2011-2183.html https://www.redhat.com/security/data/cve/CVE-2011-2213.html https://www.redhat.com/security/data/cve/CVE-2011-2491.html https://www.redhat.com/security/data/cve/CVE-2011-2492.html https://www.redhat.com/security/data/cve/CVE-2011-2495.html https://www.redhat.com/security/data/cve/CVE-2011-2497.html https://www.redhat.com/security/data/cve/CVE-2011-2517.html https://www.redhat.com/security/data/cve/CVE-2011-2689.html https://www.redhat.com/security/data/cve/CVE-2011-2695.html https://access.redhat.com/security/updates/classification/#important https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.1_Technical_Notes/kernel.html#RHSA-2011-1189 https://bugzilla.redhat.com/show_bug.cgi?id=715555 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOU72NXlSAg2UNWIIRAvuvAJ0XW+pjVB73eYV6dyMHJAKRZqTyygCeIAtM +72YbSFubpSk5fCdBrnH5XY= =wVAB -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description: These packages contain the Linux kernel. (CVE-2011-2482, Important) If you do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following to the end of the "/etc/modprobe.d/blacklist.conf" file: blacklist sctp This way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. When using a fully-virtualized guest on a host that does not use hardware assisted paging (HAP), such as those running CPUs that do not have support for (or those that have it disabled) Intel Extended Page Tables (EPT) or AMD Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged guest user could trigger this flaw to cause the hypervisor to crash. This update also fixes the following bugs: * On Broadcom PCI cards that use the tg3 driver, the operational state of a network device, represented by the value in "/sys/class/net/ethX/operstate", was not initialized by default. Consequently, the state was reported as "unknown" when the tg3 network device was actually in the "up" state. This update modifies the tg3 driver to properly set the operstate value. (BZ#744699) * A KVM (Kernel-based Virtual Machine) guest can get preempted by the host, when a higher priority process needs to run. When a guest is not running for several timer interrupts in a row, ticks could be lost, resulting in the jiffies timer advancing slower than expected and timeouts taking longer than expected. To correct for the issue of lost ticks, do_timer_tsc_timekeeping() checks a reference clock source (kvm-clock when running as a KVM guest) to see if timer interrupts have been missed. If so, jiffies is incremented by the number of missed timer interrupts, ensuring that programs are woken up on time. (BZ#747874) * When a block device object was allocated, the bd_super field was not being explicitly initialized to NULL. Previously, users of the block device object could set bd_super to NULL when the object was released by calling the kill_block_super() function. Certain third-party file systems do not always use this function, and bd_super could therefore become uninitialized when the object was allocated again. This could cause a kernel panic in the blkdev_releasepage() function, when the uninitialized bd_super field was dereferenced. Now, bd_super is properly initialized in the bdget() function, and the kernel panic no longer occurs. (BZ#751137) 4. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. ========================================================================== Ubuntu Security Notice USN-1244-1 October 25, 2011 linux-ti-omap4 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 10.10 Summary: Several security issues were fixed in the kernel. A remote attacker could exploit this to crash the kernel, leading to a denial of service. (CVE-2011-2183) Vasily Averin discovered that the NFS Lock Manager (NLM) incorrectly handled unlock requests. (CVE-2011-2491) Vasiliy Kulikov discovered that taskstats did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. (CVE-2011-2494) Vasiliy Kulikov discovered that /proc/PID/io did not enforce access restrictions. A local attacker could exploit this to read certain information, leading to a loss of privacy. (CVE-2011-2495) It was discovered that the wireless stack incorrectly verified SSID lengths. (CVE-2011-2517) It was discovered that the EXT4 filesystem contained multiple off-by-one flaws. (CVE-2011-2695) Christian Ohm discovered that the perf command looks for configuration files in the current directory. If a privileged user were tricked into running perf in a directory containing a malicious configuration file, an attacker could run arbitrary commands and possibly gain privileges. (CVE-2011-2905) Vasiliy Kulikov discovered that the Comedi driver did not correctly clear memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2011-2909) Yogesh Sharma discovered that CIFS did not correctly handle UNCs that had no prefixpaths. (CVE-2011-3363) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 10.10: linux-image-2.6.35-903-omap4 2.6.35-903.26 After a standard system update you need to reboot your computer to make all the necessary changes

Trust: 1.8

sources: NVD: CVE-2011-2495 // BID: 51749 // PACKETSTORM: 109259 // PACKETSTORM: 107394 // PACKETSTORM: 104394 // PACKETSTORM: 107847 // PACKETSTORM: 107316 // PACKETSTORM: 106204 // PACKETSTORM: 106205

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:eqversion:2.6.39

Trust: 1.6

vendor:linuxmodel:kernelscope:eqversion:2.6.39.1

Trust: 1.6

vendor:linuxmodel:kernelscope:eqversion:2.6.39.2

Trust: 1.6

vendor:linuxmodel:kernelscope:lteversion:2.6.39.3

Trust: 1.0

vendor:hitachimodel:jp1/it service level management managerscope:eqversion:-09-50

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-50

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-11-02

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-11

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-10-03

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:09-10

Trust: 0.3

vendor:hitachimodel:jp1/it service level management-managerscope:neversion:09-51

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:neversion:09-50-02

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:neversion:09-11-05

Trust: 0.3

sources: BID: 51749 // CNNVD: CNNVD-201108-548 // NVD: CVE-2011-2495

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2011-2495
value: LOW

Trust: 1.0

CNNVD: CNNVD-201108-548
value: LOW

Trust: 0.6

NVD: CVE-2011-2495
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

sources: CNNVD: CNNVD-201108-548 // NVD: CVE-2011-2495

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.0

sources: NVD: CVE-2011-2495

THREAT TYPE

local

Trust: 0.9

sources: PACKETSTORM: 107394 // PACKETSTORM: 104394 // PACKETSTORM: 107316 // CNNVD: CNNVD-201108-548

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 109259 // CNNVD: CNNVD-201201-419

CONFIGURATIONS

sources: NVD: CVE-2011-2495

PATCH

title:linux-3.4.3url:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=43386

Trust: 0.6

sources: CNNVD: CNNVD-201108-548

EXTERNAL IDS

db:NVDid:CVE-2011-2495

Trust: 2.2

db:OPENWALLid:OSS-SECURITY/2011/06/27/1

Trust: 1.6

db:BIDid:51749

Trust: 0.9

db:SECUNIAid:47804

Trust: 0.8

db:SECUNIAid:46589

Trust: 0.6

db:SECUNIAid:45897

Trust: 0.6

db:SECUNIAid:46133

Trust: 0.6

db:SECUNIAid:46995

Trust: 0.6

db:SECUNIAid:46539

Trust: 0.6

db:SECUNIAid:46308

Trust: 0.6

db:SECUNIAid:45458

Trust: 0.6

db:SECUNIAid:46598

Trust: 0.6

db:SECUNIAid:45933

Trust: 0.6

db:SECUNIAid:46824

Trust: 0.6

db:SECUNIAid:46982

Trust: 0.6

db:SECUNIAid:47007

Trust: 0.6

db:SECUNIAid:45466

Trust: 0.6

db:SECUNIAid:46590

Trust: 0.6

db:SECUNIAid:45746

Trust: 0.6

db:SECUNIAid:46060

Trust: 0.6

db:SECUNIAid:45994

Trust: 0.6

db:SECUNIAid:46587

Trust: 0.6

db:SECUNIAid:46571

Trust: 0.6

db:SECUNIAid:45810

Trust: 0.6

db:SECUNIAid:46595

Trust: 0.6

db:SECUNIAid:46795

Trust: 0.6

db:BIDid:49408

Trust: 0.6

db:NSFOCUSid:17646

Trust: 0.6

db:MLISTid:[OSS-SECURITY] 20110627 RE: CVE REQUEST: KERNEL: TASKSTATS/PROCFS IO INFOLEAK

Trust: 0.6

db:CNNVDid:CNNVD-201108-548

Trust: 0.6

db:CNNVDid:CNNVD-201201-419

Trust: 0.6

db:HITACHIid:HS12-005

Trust: 0.4

db:PACKETSTORMid:109259

Trust: 0.1

db:PACKETSTORMid:107394

Trust: 0.1

db:PACKETSTORMid:104394

Trust: 0.1

db:PACKETSTORMid:107847

Trust: 0.1

db:PACKETSTORMid:107316

Trust: 0.1

db:PACKETSTORMid:106204

Trust: 0.1

db:PACKETSTORMid:106205

Trust: 0.1

sources: BID: 51749 // PACKETSTORM: 109259 // PACKETSTORM: 107394 // PACKETSTORM: 104394 // PACKETSTORM: 107847 // PACKETSTORM: 107316 // PACKETSTORM: 106204 // PACKETSTORM: 106205 // CNNVD: CNNVD-201108-548 // CNNVD: CNNVD-201201-419 // NVD: CVE-2011-2495

REFERENCES

url:https://github.com/torvalds/linux/commit/1d1221f375c94ef961ba8574ac4f85c8870ddd51

Trust: 1.6

url:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1d1221f375c94ef961ba8574ac4f85c8870ddd51

Trust: 1.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=716825

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2011/06/27/1

Trust: 1.6

url:http://ftp.osuosl.org/pub/linux/kernel/v2.6/changelog-2.6.39.4

Trust: 1.6

url:http://rhn.redhat.com/errata/rhsa-2011-1212.html

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2011-2495

Trust: 0.6

url:http://secunia.com/advisories/45458

Trust: 0.6

url:http://secunia.com/advisories/45466

Trust: 0.6

url:http://secunia.com/advisories/45746

Trust: 0.6

url:http://secunia.com/advisories/45810

Trust: 0.6

url:http://secunia.com/advisories/45897

Trust: 0.6

url:http://secunia.com/advisories/45933

Trust: 0.6

url:http://secunia.com/advisories/45994

Trust: 0.6

url:http://secunia.com/advisories/46060

Trust: 0.6

url:http://secunia.com/advisories/46133

Trust: 0.6

url:http://secunia.com/advisories/46308

Trust: 0.6

url:http://secunia.com/advisories/46539

Trust: 0.6

url:http://secunia.com/advisories/46571

Trust: 0.6

url:http://secunia.com/advisories/46587

Trust: 0.6

url:http://secunia.com/advisories/46589

Trust: 0.6

url:http://secunia.com/advisories/46590

Trust: 0.6

url:http://secunia.com/advisories/46595

Trust: 0.6

url:http://secunia.com/advisories/46598

Trust: 0.6

url:http://secunia.com/advisories/46795

Trust: 0.6

url:http://secunia.com/advisories/46824

Trust: 0.6

url:http://secunia.com/advisories/46982

Trust: 0.6

url:http://secunia.com/advisories/46995

Trust: 0.6

url:http://secunia.com/advisories/47007

Trust: 0.6

url:http://secunia.com/advisories/47804

Trust: 0.6

url:http://www.securityfocus.com/bid/49408

Trust: 0.6

url:http://www.nsfocus.net/vulndb/17646

Trust: 0.6

url:http://www.securityfocus.com/bid/51749

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2011-2517

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2011-2491

Trust: 0.5

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs12-005/index.html

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-2183

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-2909

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-2905

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-2494

Trust: 0.4

url:http://www.hds.com/products/storage-software/hitachi-device-manager.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-2695

Trust: 0.3

url:https://access.redhat.com/kb/docs/doc-11259

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2011-2495.html

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2011-2491.html

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2011-2517.html

Trust: 0.2

url:https://access.redhat.com/security/team/key/#package

Trust: 0.2

url:http://bugzilla.redhat.com/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3363

Trust: 0.2

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47804

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs12-005/index.html

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/47804/#comments

Trust: 0.1

url:http://secunia.com/advisories/47804/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/2.6.38-13.52

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1285-1

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1776.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1593

Trust: 0.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=715555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1182

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2497.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2497

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1593.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2689

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2492.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2011-1189.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2689.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2213.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1776

Trust: 0.1

url:https://docs.redhat.com/docs/en-us/red_hat_enterprise_linux/6/html/6.1_technical_notes/kernel.html#rhsa-2011-1189

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2213

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2183.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1898.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1576.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2695.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1576

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1182.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2901.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2482

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2482.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2011-1813.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2519

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2519.html

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1279-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-lts-backport-natty/2.6.38-13.52~lucid1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3188

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1243-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/2.6.35-30.61

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1479

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3873

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1244-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ti-omap4/2.6.35-903.26

Trust: 0.1

sources: BID: 51749 // PACKETSTORM: 109259 // PACKETSTORM: 107394 // PACKETSTORM: 104394 // PACKETSTORM: 107847 // PACKETSTORM: 107316 // PACKETSTORM: 106204 // PACKETSTORM: 106205 // CNNVD: CNNVD-201108-548 // CNNVD: CNNVD-201201-419 // NVD: CVE-2011-2495

CREDITS

Hitachi

Trust: 0.9

sources: BID: 51749 // CNNVD: CNNVD-201201-419

SOURCES

db:BIDid:51749
db:PACKETSTORMid:109259
db:PACKETSTORMid:107394
db:PACKETSTORMid:104394
db:PACKETSTORMid:107847
db:PACKETSTORMid:107316
db:PACKETSTORMid:106204
db:PACKETSTORMid:106205
db:CNNVDid:CNNVD-201108-548
db:CNNVDid:CNNVD-201201-419
db:NVDid:CVE-2011-2495

LAST UPDATE DATE

2023-02-11T19:26:09.654000+00:00


SOURCES UPDATE DATE

db:BIDid:51749date:2012-01-31T00:00:00
db:CNNVDid:CNNVD-201108-548date:2012-06-14T00:00:00
db:CNNVDid:CNNVD-201201-419date:2012-02-02T00:00:00
db:NVDid:CVE-2011-2495date:2013-12-31T04:08:00

SOURCES RELEASE DATE

db:BIDid:51749date:2012-01-31T00:00:00
db:PACKETSTORMid:109259date:2012-01-31T06:49:21
db:PACKETSTORMid:107394date:2011-11-30T01:00:53
db:PACKETSTORMid:104394date:2011-08-24T03:11:18
db:PACKETSTORMid:107847date:2011-12-14T02:33:20
db:PACKETSTORMid:107316date:2011-11-24T17:17:00
db:PACKETSTORMid:106204date:2011-10-25T19:54:45
db:PACKETSTORMid:106205date:2011-10-25T19:55:32
db:CNNVDid:CNNVD-201108-548date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201201-419date:1900-01-01T00:00:00
db:NVDid:CVE-2011-2495date:2012-06-13T10:24:00