Upstream information

CVE-2011-2707 at MITRE


The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request.

SUSE information

Overall state of this security issue: Ignore

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.9
Vector AV:L/AC:L/Au:N/C:C/I:N/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact None
Availability Impact None

Note from the SUSE Security Team

The xtensa architecture is not included in our Linux kernels or products. So none of our products are affected by this problem.

SUSE Bugzilla entry: 707337 [RESOLVED / INVALID]

No SUSE Security Announcements cross referenced.