Unrated severityNVD Advisory· Published Feb 28, 2011· Updated Apr 29, 2026
CVE-2011-1020
CVE-2011-1020
Description
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- seclists.org/fulldisclosure/2011/Jan/421nvdExploitMailing ListThird Party Advisory
- www.halfdog.net/Security/2011/SuidBinariesAndProcInterface/nvdExploitThird Party Advisory
- lkml.org/lkml/2011/2/7/368nvdExploitMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2011/02/24/18nvdMailing ListThird Party Advisory
- openwall.com/lists/oss-security/2011/02/25/2nvdMailing ListThird Party Advisory
- secunia.com/advisories/43496nvdThird Party Advisory
- securityreason.com/securityalert/8107nvdThird Party Advisory
- www.securityfocus.com/bid/46567nvdThird Party AdvisoryVDB Entry
- exchange.xforce.ibmcloud.com/vulnerabilities/65693nvdThird Party AdvisoryVDB Entry
- lkml.org/lkml/2011/2/10/21nvdMailing ListThird Party Advisory
- lkml.org/lkml/2011/2/7/404nvdMailing ListThird Party Advisory
- lkml.org/lkml/2011/2/7/414nvdMailing ListThird Party Advisory
- lkml.org/lkml/2011/2/7/466nvdMailing ListThird Party Advisory
- lkml.org/lkml/2011/2/7/474nvdMailing ListThird Party Advisory
- lkml.org/lkml/2011/2/9/417nvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.