### [CVE-2011-2707](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2707) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request. ### POC #### Reference - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 #### Github No PoCs found on GitHub currently.