VYPR
Medium severity6.0NVD Advisory· Published May 24, 2012· Updated Apr 29, 2026

CVE-2011-2707

CVE-2011-2707

Description

The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request.

Affected products

1
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
    Range: <3.1

Patches

1
0d0138ebe24b

xtensa: prevent arbitrary read in ptrace

https://github.com/torvalds/linuxDan RosenbergJul 26, 2011via nvd-ref
1 file changed · +3 0
  • arch/xtensa/kernel/ptrace.c+3 0 modified
    @@ -147,6 +147,9 @@ int ptrace_setxregs(struct task_struct *child, void __user *uregs)
     	elf_xtregs_t *xtregs = uregs;
     	int ret = 0;
     
    +	if (!access_ok(VERIFY_READ, uregs, sizeof(elf_xtregs_t)))
    +		return -EFAULT;
    +
     #if XTENSA_HAVE_COPROCESSORS
     	/* Flush all coprocessors before we overwrite them. */
     	coprocessor_flush_all(ti);
    

Vulnerability mechanics

Synthesis attempt was rejected by the grounding validator. Re-run pending.

References

3

News mentions

0

No linked articles in our index yet.