arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2014-08-01 11:13
Updated : 2025-04-12 10:46
NVD link : CVE-2014-3534
Mitre link : CVE-2014-3534
CVE.ORG link : CVE-2014-3534
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-269
Improper Privilege Management