Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2014-3534
PUBLISHED
More InfoOfficial Page
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
View Known Exploited Vulnerability (KEV) details
Published At-01 Aug, 2014 | 10:00
Updated At-06 Aug, 2024 | 10:50
Rejected At-
▼CVE Numbering Authority (CNA)

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/95069
vdb-entry
x_refsource_XF
https://bugzilla.redhat.com/show_bug.cgi?id=1114089
x_refsource_CONFIRM
http://secunia.com/advisories/59790
third-party-advisory
x_refsource_SECUNIA
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8
x_refsource_CONFIRM
http://www.securityfocus.com/bid/68940
vdb-entry
x_refsource_BID
https://github.com/torvalds/linux/commit/dab6cf55f81a6e16b8147aed9a843e1691dcd318
x_refsource_CONFIRM
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dab6cf55f81a6e16b8147aed9a843e1691dcd318
x_refsource_CONFIRM
http://www.securitytracker.com/id/1030683
vdb-entry
x_refsource_SECTRACK
http://www.osvdb.org/109546
vdb-entry
x_refsource_OSVDB
http://www.debian.org/security/2014/dsa-2992
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/60351
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/95069
vdb-entry
x_refsource_XF
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=1114089
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/59790
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/68940
vdb-entry
x_refsource_BID
x_transferred
https://github.com/torvalds/linux/commit/dab6cf55f81a6e16b8147aed9a843e1691dcd318
x_refsource_CONFIRM
x_transferred
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dab6cf55f81a6e16b8147aed9a843e1691dcd318
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id/1030683
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.osvdb.org/109546
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.debian.org/security/2014/dsa-2992
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/60351
third-party-advisory
x_refsource_SECUNIA
x_transferred
Details not found