CVE-2011-0726
Publication date 11 March 2011
Last updated 24 July 2024
Ubuntu priority
The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
From the Ubuntu Security Team
Kees Cook reported that /proc/pid/stat did not correctly filter certain memory locations. A local attacker could determine the memory layout of processes in an attempt to increase the chances of a successful memory corruption exploit.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1202-1
- Linux kernel (OMAP4) vulnerabilities
- 13 September 2011
- USN-1160-1
- Linux kernel vulnerabilities
- 28 June 2011
- USN-1141-1
- Linux kernel vulnerabilities
- 1 June 2011
- USN-1170-1
- Linux kernel vulnerabilities
- 15 July 2011
- USN-1204-1
- Linux kernel (i.MX51) vulnerabilities
- 13 September 2011
- USN-1162-1
- Linux kernel vulnerabilities (Marvell Dove)
- 29 June 2011
- USN-1187-1
- Linux kernel (Maverick backport) vulnerabilities
- 9 August 2011
- USN-1159-1
- Linux kernel vulnerabilities (Marvell Dove)
- 13 July 2011