First published: Fri Jun 27 2014(Updated: )
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.62 | |
Linux Linux kernel | >=3.3<3.4.101 | |
Linux Linux kernel | >=3.5<3.10.51 | |
Linux Linux kernel | >=3.11<3.12.27 | |
Linux Linux kernel | >=3.13<3.14.15 | |
Linux Linux kernel | >=3.15<3.15.8 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.