CVE-2008-2137
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
29/05/2008
Last modified:
30/10/2018
Description
The (1) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c and the (2) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3, omit some virtual-address range (aka span) checks when the mmap MAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mmap calls.
Impact
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://kerneltrap.org/mailarchive/git-commits-head/2008/5/8/1760604
- http://secunia.com/advisories/30368
- http://secunia.com/advisories/30499
- http://secunia.com/advisories/31107
- http://www.debian.org/security/2008/dsa-1588
- http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.5
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3
- http://www.securityfocus.com/bid/29397
- http://www.securitytracker.com/id?1020119=
- http://www.ubuntu.com/usn/usn-625-1
- http://www.vupen.com/english/advisories/2008/1716/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42681