The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
https://lkml.org/lkml/2011/2/9/417
https://lkml.org/lkml/2011/2/7/474
https://lkml.org/lkml/2011/2/7/466
https://lkml.org/lkml/2011/2/7/414
https://lkml.org/lkml/2011/2/7/404
https://lkml.org/lkml/2011/2/10/21
https://exchange.xforce.ibmcloud.com/vulnerabilities/65693
http://www.securityfocus.com/bid/46567
http://securityreason.com/securityalert/8107
http://secunia.com/advisories/43496