7.2
CVSSv2

CVE-2014-3534

Published: 01/08/2014 Updated: 03/10/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

arch/s390/kernel/ptrace.c in the Linux kernel prior to 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 7.0

Vendor Advisories

Debian Bug report logs - #728705 gdb fails on s390x with "Couldn't write registers: Invalid argument" Package: src:linux; Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>; Affects: gdb Reported by: Thibaut Paumard <thibaut@debianorg> Date: Mon, 4 Nov 2013 13:45:02 UTC Severity: importa ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation: CVE-2014-3534 Martin Schwidefsky of IBM discovered that the ptrace subsystem does not properly sanitize the psw mask value On s390 systems, an unprivileged local user could use this flaw to set address space ...