CVE-2011-4915
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2011-4915 is a vulnerability in the Linux kernel through version 3.1 that affects the fs/proc/base.c component. The vulnerability was discovered in late 2011 and allows local users to obtain sensitive keystroke information by accessing /proc/interrupts. This information disclosure vulnerability enables attackers to monitor keyboard interrupt patterns to determine details about user input, including password lengths (CVE Details, Ubuntu Security).

Technical details

The vulnerability exists due to world-readable access to /proc/interrupts, which contains information about the number of interrupts emitted since system boot. On multi-core systems, an attacker can monitor one CPU core while the victim executes on another, allowing them to track keyboard interrupt counters. The vulnerability has a CVSS 3.1 score of 5.5 (Medium), with attack vector being Local, attack complexity Low, and requiring Low privileges. The vulnerability primarily impacts confidentiality, with no impact on integrity or availability (Ubuntu Security).

Impact

The vulnerability allows local attackers to monitor keyboard interrupt patterns and determine the precise number of characters in users' passwords, particularly during the execution of privilege escalation tools like gksu. By analyzing the timing and frequency of interrupts, attackers can potentially perform statistical analysis to deduce the actual characters being typed (OSS Security).

Mitigation and workarounds

The vulnerability was addressed through kernel commits 0499680a42141d86417a8fbaa8c8db806bea1201 and a2ef990ab5a6705a356d146dd773a3b359787497, which introduced new mount options (hidepid and gid) to restrict access to /proc/interrupts. The fix changes the default permissions of /proc/interrupts to be readable only by root users (LKML, Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22857MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp-plugins
NoNoJan 14, 2026
CVE-2026-22856MEDIUM6.8
  • Linux DebianLinux Debian
  • freerdp2
NoNoJan 14, 2026
CVE-2026-22859MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22858MEDIUM5.6
  • Linux DebianLinux Debian
  • freerdp3
NoNoJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management