CVE-2011-2707
24.05.2012, 23:55
The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 < 3.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References