Medium severity6.0NVD Advisory· Published May 24, 2012· Updated Apr 29, 2026
CVE-2011-2707
CVE-2011-2707
Description
The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request.
Affected products
1Patches
10d0138ebe24bxtensa: prevent arbitrary read in ptrace
1 file changed · +3 −0
arch/xtensa/kernel/ptrace.c+3 −0 modified@@ -147,6 +147,9 @@ int ptrace_setxregs(struct task_struct *child, void __user *uregs) elf_xtregs_t *xtregs = uregs; int ret = 0; + if (!access_ok(VERIFY_READ, uregs, sizeof(elf_xtregs_t))) + return -EFAULT; + #if XTENSA_HAVE_COPROCESSORS /* Flush all coprocessors before we overwrite them. */ coprocessor_flush_all(ti);
Vulnerability mechanics
Synthesis attempt was rejected by the grounding validator. Re-run pending.
References
3- www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1nvdMailing ListPatchVendor Advisory
- github.com/torvalds/linux/commit/0d0138ebe24b94065580bd2601f8bb7eb6152f56nvdPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2011/07/20/18nvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.