TITLE: Linux Kernel "mm_for_maps()" Information Disclosure SECUNIA ADVISORY ID: SA36265 VERIFY ADVISORY: http://secunia.com/advisories/36265/ DESCRIPTION: A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. The vulnerability is caused due to an error within the "mm_for_maps()" function in fs/proc/base.c. This can be exploited to disclose the content of the "maps" and "smaps" files from the "/proc" filesystem for a setuid process which is starting. SOLUTION: Fixed in the GIT repository: http://git.kernel.org/linus/13f0feafa6b8aead57a2a328e2fca6a5828bf286 http://git.kernel.org/linus/00f89d218523b9bf6b522349c039d5ac80aa536d http://git.kernel.org/linus/704b836cbf19e885f8366bccb2e4b0474346c02d
CVE-2009-2691 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2691): The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and earlier allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.