CVE-2011-2707

medium

Description

The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request.

References

https://github.com/torvalds/linux/commit/0d0138ebe24b94065580bd2601f8bb7eb6152f56

http://www.openwall.com/lists/oss-security/2011/07/20/18

http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0d0138ebe24b94065580bd2601f8bb7eb6152f56

Details

Source: Mitre, NVD

Published: 2012-05-24

Updated: 2023-02-13

Risk Information

CVSS v2

Base Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:P

Severity: Low

CVSS v3

Base Score: 6

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H

Severity: Medium