Out-of-Bounds Affecting torvalds/linux package, versions [2.6.30,2.6.30.1]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
3.93% (88th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-3004383
  • published26 Jan 2022
  • disclosed20 Jul 2009
  • creditUnknown

Introduced: 20 Jul 2009

CVE-2009-1897  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for torvalds/linux.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. The tun_chr_poll function in drivers/net/tun.c in the tun subsystem in the Linux kernel 2.6.30 and 2.6.30.1, when the -fno-delete-null-pointer-checks gcc option is omitted, allows local users to gain privileges via vectors involving a NULL pointer dereference and an mmap of /dev/net/tun, a different vulnerability than CVE-2009-1894.

References

CVSS Base Scores

version 3.1