Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-4080

Опубликовано: 24 мая 2012
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4

Описание

The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment.

РелизСтатусПримечание
devel

not-affected

3.1.0-1.0
hardy

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

2.6.38-8.40
oneiric

not-affected

2.6.39-0.1
precise

not-affected

3.1.0-1.1
upstream

released

2.6.39~rc1

Показывать по

РелизСтатусПримечание
devel

not-affected

3.2.0-1602.5
hardy

DNE

lucid

DNE

natty

DNE

oneiric

DNE

precise

not-affected

3.2.0-1600.1
upstream

released

2.6.39~rc1

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

maverick

ignored

end of life
natty

DNE

oneiric

DNE

precise

DNE

upstream

released

2.6.39~rc1

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

upstream

released

2.6.39~rc1

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

upstream

released

2.6.39~rc1

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

2.6.38-8.40~lucid1
maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

upstream

released

2.6.39~rc1

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

3.0.0-5.6~lucid1
maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

upstream

released

2.6.39~rc1

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

ignored

end of life
maverick

not-affected

natty

DNE

oneiric

DNE

precise

DNE

upstream

released

2.6.39~rc1

Показывать по

РелизСтатусПримечание
devel

not-affected

3.0.0-1401.2
hardy

DNE

lucid

DNE

maverick

not-affected

natty

not-affected

2.6.38-1208.11
oneiric

not-affected

2.6.38-1309.13
precise

not-affected

3.0.0-1401.2
upstream

released

2.6.39~rc1

Показывать по

EPSS

Процентиль: 22%
0.00074
Низкий

4 Medium

CVSS2

Связанные уязвимости

redhat
почти 15 лет назад

The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment.

nvd
больше 13 лет назад

The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment.

debian
больше 13 лет назад

The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kern ...

github
больше 3 лет назад

The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment.

EPSS

Процентиль: 22%
0.00074
Низкий

4 Medium

CVSS2