Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3534

Опубликовано: 01 авг. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.

РелизСтатусПримечание
devel

not-affected

s390 specific
esm-infra-legacy/trusty

not-affected

s390 specific
lucid

not-affected

s390 specific
precise

not-affected

s390 specific
trusty

not-affected

s390 specific
trusty/esm

not-affected

s390 specific
upstream

released

3.16~rc7
utopic

not-affected

s390 specific
vivid

not-affected

s390 specific
vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

s390 specific
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

not-affected

s390 specific
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

s390 specific
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.16~rc7
utopic

not-affected

s390 specific
vivid

not-affected

s390 specific
vivid/stable-phone-overlay

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

s390 specific
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.16~rc7
utopic

not-affected

s390 specific
vivid

not-affected

s390 specific
vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.16~rc7
utopic

ignored

end of life
vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

s390 specific
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

s390 specific
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

s390 specific
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

s390 specific
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.16.0-25.33~14.04.2]]
lucid

DNE

precise

DNE

trusty

not-affected

3.16.0-25.33~14.04.2
trusty/esm

DNE

trusty was not-affected [3.16.0-25.33~14.04.2]
upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.19.0-18.18~14.04.1]]
lucid

DNE

precise

DNE

trusty

not-affected

3.19.0-18.18~14.04.1
trusty/esm

DNE

trusty was not-affected [3.19.0-18.18~14.04.1]
upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

s390 specific
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.16~rc7
utopic

not-affected

s390 specific
vivid

not-affected

s390 specific
vivid/stable-phone-overlay

not-affected

Показывать по

РелизСтатусПримечание
devel

not-affected

s390 specific
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.16~rc7
utopic

not-affected

s390 specific
vivid

not-affected

s390 specific
vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

4.2.0-1014.21
esm-infra-legacy/trusty

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

released

4.2.0-1014.21
wily

not-affected

4.2.0-1008.12

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

not-affected

s390 specific
trusty

DNE

trusty/esm

DNE

upstream

released

3.16~rc7
utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

Ссылки на источники

EPSS

Процентиль: 23%
0.00074
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.

nvd
почти 11 лет назад

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.

debian
почти 11 лет назад

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s39 ...

github
около 3 лет назад

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.

oracle-oval
почти 11 лет назад

ELSA-2014-1023: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 23%
0.00074
Низкий

7.2 High

CVSS2

Уязвимость CVE-2014-3534