The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request.
References
| Link | Resource |
|---|---|
| https://github.com/torvalds/linux/commit/0d0138ebe24b94065580bd2601f8bb7eb6152f56 | Patch Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2011/07/20/18 | Mailing List Third Party Advisory |
| http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0d0138ebe24b94065580bd2601f8bb7eb6152f56 | Mailing List Patch Vendor Advisory |
| http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 | Mailing List Patch Vendor Advisory |
Configurations
Information
Published : 2012-05-24 23:55
Updated : 2020-08-06 16:23
NVD link : CVE-2011-2707
Mitre link : CVE-2011-2707
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
