MEDIUM · 4.0

CVE-2011-4080

The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to byp...

Vulnerability Description

The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment.

CVSS Score

4.0

MEDIUM

AV:L/AC:H/Au:N/C:C/I:N/A:N
Confidentiality
COMPLETE
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
LinuxLinux Kernel< 2.6.39

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-4080?

CVE-2011-4080 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to byp...

How severe is CVE-2011-4080?

CVE-2011-4080 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2011-4080?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.