First published: Fri Jun 27 2014(Updated: )
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.2.62 | |
Linux Kernel | >=3.3<3.4.101 | |
Linux Kernel | >=3.5<3.10.51 | |
Linux Kernel | >=3.11<3.12.27 | |
Linux Kernel | >=3.13<3.14.15 | |
Linux Kernel | >=3.15<3.15.8 | |
Debian GNU/Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3534 is classified as a high severity vulnerability due to its potential to allow local users to escalate privileges by manipulating kernel memory.
To fix CVE-2014-3534, update the Linux kernel to version 3.15.8 or later, where this vulnerability has been addressed.
CVE-2014-3534 affects the s390 platform of the Linux kernel, specifically versions prior to 3.15.8.
CVE-2014-3534 is a local privilege escalation vulnerability that allows users to read and write kernel memory.
While CVE-2014-3534 primarily affects the Linux kernel, it may also impact specific distributions like Debian if running affected kernel versions.