Access Restriction Bypass Affecting torvalds/linux package, versions [,2.4.36.5)[2.6.25.0,2.6.25.3)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-3005670
  • published26 Jan 2022
  • disclosed29 May 2008
  • creditUnknown

Introduced: 29 May 2008

CVE-2008-2137  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade torvalds/linux to version 2.4.36.5, 2.6.25.3 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. The (1) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c and the (2) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3, omit some virtual-address range (aka span) checks when the mmap MAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mmap calls.

References

CVSS Base Scores

version 3.1