Headline
CVE-2014-3534: s390/ptrace: fix PSW mask check · torvalds/linux@dab6cf5
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.
Commit
Permalink
Browse files
Browse the repository at this point in the history
s390/ptrace: fix PSW mask check
The PSW mask check of the PTRACE_POKEUSR_AREA command is incorrect. The PSW_MASK_USER define contains the PSW_MASK_ASC bits, the ptrace interface accepts all combinations for the address-space-control bits. To protect the kernel space the PSW mask check in ptrace needs to reject the address-space-control bit combination for home space.
Fixes CVE-2014-3534
Cc: [email protected] Signed-off-by: Martin Schwidefsky [email protected]
- Loading branch information