2.1
CVE-2011-2494
- EPSS 0.13%
- Published 13.06.2012 10:24:55
- Last modified 11.04.2025 00:51:21
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
kernel/taskstats.c in the Linux kernel before 3.1 allows local users to obtain sensitive I/O statistics by sending taskstats commands to a netlink socket, as demonstrated by discovering the length of another user's password.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version <= 3.0.34
Linux ≫ Linux Kernel Version3.0.1
Linux ≫ Linux Kernel Version3.0.2
Linux ≫ Linux Kernel Version3.0.3
Linux ≫ Linux Kernel Version3.0.4
Linux ≫ Linux Kernel Version3.0.5
Linux ≫ Linux Kernel Version3.0.6
Linux ≫ Linux Kernel Version3.0.7
Linux ≫ Linux Kernel Version3.0.8
Linux ≫ Linux Kernel Version3.0.9
Linux ≫ Linux Kernel Version3.0.10
Linux ≫ Linux Kernel Version3.0.11
Linux ≫ Linux Kernel Version3.0.12
Linux ≫ Linux Kernel Version3.0.13
Linux ≫ Linux Kernel Version3.0.14
Linux ≫ Linux Kernel Version3.0.15
Linux ≫ Linux Kernel Version3.0.16
Linux ≫ Linux Kernel Version3.0.17
Linux ≫ Linux Kernel Version3.0.18
Linux ≫ Linux Kernel Version3.0.19
Linux ≫ Linux Kernel Version3.0.20
Linux ≫ Linux Kernel Version3.0.21
Linux ≫ Linux Kernel Version3.0.22
Linux ≫ Linux Kernel Version3.0.23
Linux ≫ Linux Kernel Version3.0.24
Linux ≫ Linux Kernel Version3.0.25
Linux ≫ Linux Kernel Version3.0.26
Linux ≫ Linux Kernel Version3.0.27
Linux ≫ Linux Kernel Version3.0.28
Linux ≫ Linux Kernel Version3.0.29
Linux ≫ Linux Kernel Version3.0.30
Linux ≫ Linux Kernel Version3.0.31
Linux ≫ Linux Kernel Version3.0.32
Linux ≫ Linux Kernel Version3.0.33
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.13% | 0.325 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.