It was found that Linux kernel's ptrace subsystem did not properly sanitize the address-space-control bits when the program-status word (PSW) was being set. On IBM S/390 systems, a local, unprivileged user could use this flaw to set address-space-control bits to the kernel space, and thus gain read and write access to kernel memory.
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
|Base Score:||7.2||Base Metrics:||AV:L/AC:L/Au:N/C:C/I:C/A:C|
|Access Vector:||Local network||Attack Complexity:||Low|
|Authentication:||None required||Confidentiality Impact:||Complete|
|Integrity Impact:||Complete||Availability Impact:||Complete|
|Oracle Linux version 7 (kernel)||ELSA-2014-1023||2014-08-06|
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team