taskstats information may be used for gathering private information. E.g. for openssh and vsftpd daemons read_characters/write_characters may be used to learn the precise password length. Restrict it to processes being able to ptrace the target process. For TASKSTATS_CMD_ATTR_REGISTER_CPUMASK the fix is euid check instead of a ptrace check as the handler is processed in the context of the target process, not the listener process'. When ptrace_task_may_access_current() is introduced, it should be used instead of euid check. Currently there is a small race when a process temporarily changes its euid (e.g. to access user's files), until the process sets euid back user's processes may gather privileged process' statistics. taskstats authorized_keys presence infoleak PoC http://seclists.org/oss-sec/2011/q2/659 [0/2] restrict statistics information to user https://lkml.org/lkml/2011/6/24/88 [1/2] proc: restrict access to /proc/PID/io (CVE-2011-2495) https://patchwork.kernel.org/patch/916032/ [2/2] taskstats: restrict access to user (CVE-2011-2494) https://patchwork.kernel.org/patch/916042/ http://article.gmane.org/gmane.comp.security.oss.general/5337 Linus suggested returning accounting information at a 1k granularity instead. Acknowledgements: Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.
Statement: This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not provide support for the Taskstats interface. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1479.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2012-0010.html.
(In reply to comment #0) [...] > [2/2] taskstats: restrict access to user (CVE-2011-2494) > https://patchwork.kernel.org/patch/916042/ http://article.gmane.org/gmane.comp.security.oss.general/5366
(In reply to comment #4) > (In reply to comment #0) > [...] > > [2/2] taskstats: restrict access to user (CVE-2011-2494) > > https://patchwork.kernel.org/patch/916042/ > > http://article.gmane.org/gmane.comp.security.oss.general/5366 Upstream patch: https://github.com/torvalds/linux/commit/1a51410abe7d0ee4b1d112780f46df87d3621043
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:1465 https://rhn.redhat.com/errata/RHSA-2011-1465.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2011:1479 https://rhn.redhat.com/errata/RHSA-2011-1479.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2012:0010 https://rhn.redhat.com/errata/RHSA-2012-0010.html