Vulnerability Description
The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 2.6.39 |
Related Weaknesses (CWE)
References
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39Broken Link
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.openwall.com/lists/oss-security/2011/10/26/10Mailing ListThird Party Advisory
- https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcPatchThird Party Advisory
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39Broken Link
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://www.openwall.com/lists/oss-security/2011/10/26/10Mailing ListThird Party Advisory
- https://github.com/torvalds/linux/commit/bfdc0b497faa82a0ba2f9dddcf109231dd519fcPatchThird Party Advisory
FAQ
What is CVE-2011-4080?
CVE-2011-4080 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to byp...
How severe is CVE-2011-4080?
CVE-2011-4080 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4080?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.