CVE Vulnerabilities

CVE-2014-3534

Improper Privilege Management

Published: Aug 01, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
7.2 IMPORTANT
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux*3.2.62 (excluding)
Linux_kernelLinux3.3 (including)3.4.101 (excluding)
Linux_kernelLinux3.5 (including)3.10.51 (excluding)
Linux_kernelLinux3.11 (including)3.12.27 (excluding)
Linux_kernelLinux3.13 (including)3.14.15 (excluding)
Linux_kernelLinux3.15 (including)3.15.8 (excluding)
Red Hat Enterprise Linux 7RedHatkernel-0:3.10.0-123.6.3.el7*
LinuxUbuntuupstream*
Linux-2.6Ubuntuupstream*
Linux-armadaxpUbuntuupstream*
Linux-ec2Ubuntuupstream*
Linux-floUbuntutrusty*
Linux-floUbuntuupstream*
Linux-fsl-imx51Ubuntulucid*
Linux-fsl-imx51Ubuntuupstream*
Linux-goldfishUbuntutrusty*
Linux-goldfishUbuntuupstream*
Linux-grouperUbuntutrusty*
Linux-grouperUbuntuupstream*
Linux-grouperUbuntuutopic*
Linux-linaro-omapUbuntuprecise*
Linux-linaro-omapUbuntuupstream*
Linux-linaro-sharedUbuntuprecise*
Linux-linaro-sharedUbuntuupstream*
Linux-linaro-vexpressUbuntuprecise*
Linux-linaro-vexpressUbuntuupstream*
Linux-lts-quantalUbuntuupstream*
Linux-lts-raringUbuntuupstream*
Linux-lts-saucyUbuntuupstream*
Linux-lts-trustyUbuntuupstream*
Linux-lts-utopicUbuntuupstream*
Linux-lts-vividUbuntuupstream*
Linux-maguroUbuntutrusty*
Linux-maguroUbuntuupstream*
Linux-makoUbuntutrusty*
Linux-makoUbuntuupstream*
Linux-mantaUbuntutrusty*
Linux-mantaUbuntuupstream*
Linux-mvl-doveUbuntulucid*
Linux-mvl-doveUbuntuupstream*
Linux-qcm-msmUbuntulucid*
Linux-qcm-msmUbuntuprecise*
Linux-qcm-msmUbuntuupstream*
Linux-raspi2Ubuntuupstream*
Linux-raspi2Ubuntuvivid/ubuntu-core*
Linux-ti-omap4Ubuntuupstream*

Potential Mitigations

References