Lucene search

K
cve[email protected]CVE-2008-2137
HistoryMay 29, 2008 - 4:32 p.m.

CVE-2008-2137

2008-05-2916:32:00
CWE-264
web.nvd.nist.gov
41
cve-2008-2137
linux kernel
denial of service
mmap
span checks
nvd
security vulnerability

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

5.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

The (1) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c and the (2) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3, omit some virtual-address range (aka span) checks when the mmap MAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mmap calls.

Affected configurations

NVD
Node
debiandebian_linuxMatch4.0sparc
OR
linuxlinux_kernelMatch2.6.0
OR
linuxlinux_kernelMatch2.6.1
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6.3
OR
linuxlinux_kernelMatch2.6.4
OR
linuxlinux_kernelMatch2.6.5
OR
linuxlinux_kernelMatch2.6.6
OR
linuxlinux_kernelMatch2.6.7
OR
linuxlinux_kernelMatch2.6.8
OR
linuxlinux_kernelMatch2.6.9
OR
linuxlinux_kernelMatch2.6.10
OR
linuxlinux_kernelMatch2.6.11
OR
linuxlinux_kernelMatch2.6.11.4
OR
linuxlinux_kernelMatch2.6.11.5
OR
linuxlinux_kernelMatch2.6.11.6
OR
linuxlinux_kernelMatch2.6.11.7
OR
linuxlinux_kernelMatch2.6.11.8
OR
linuxlinux_kernelMatch2.6.11.11
OR
linuxlinux_kernelMatch2.6.11.12
OR
linuxlinux_kernelMatch2.6.12
OR
linuxlinux_kernelMatch2.6.12.1
OR
linuxlinux_kernelMatch2.6.12.2
OR
linuxlinux_kernelMatch2.6.12.3
OR
linuxlinux_kernelMatch2.6.12.4
OR
linuxlinux_kernelMatch2.6.12.5
OR
linuxlinux_kernelMatch2.6.12.6
OR
linuxlinux_kernelMatch2.6.12.12
OR
linuxlinux_kernelMatch2.6.12.22
OR
linuxlinux_kernelMatch2.6.13
OR
linuxlinux_kernelMatch2.6.13.1
OR
linuxlinux_kernelMatch2.6.13.2
OR
linuxlinux_kernelMatch2.6.13.3
OR
linuxlinux_kernelMatch2.6.13.4
OR
linuxlinux_kernelMatch2.6.14
OR
linuxlinux_kernelMatch2.6.14.1
OR
linuxlinux_kernelMatch2.6.14.2
OR
linuxlinux_kernelMatch2.6.14.3
OR
linuxlinux_kernelMatch2.6.14.4
OR
linuxlinux_kernelMatch2.6.14.5
OR
linuxlinux_kernelMatch2.6.15
OR
linuxlinux_kernelMatch2.6.15.1
OR
linuxlinux_kernelMatch2.6.15.2
OR
linuxlinux_kernelMatch2.6.15.3
OR
linuxlinux_kernelMatch2.6.15.4
OR
linuxlinux_kernelMatch2.6.15.5
OR
linuxlinux_kernelMatch2.6.15.11
OR
linuxlinux_kernelMatch2.6.16
OR
linuxlinux_kernelMatch2.6.16.13
OR
linuxlinux_kernelMatch2.6.16.27
OR
linuxlinux_kernelMatch2.6.17
OR
linuxlinux_kernelMatch2.6.17.1
OR
linuxlinux_kernelMatch2.6.17.2
OR
linuxlinux_kernelMatch2.6.17.3
OR
linuxlinux_kernelMatch2.6.17.5
OR
linuxlinux_kernelMatch2.6.17.6
OR
linuxlinux_kernelMatch2.6.17.7
OR
linuxlinux_kernelMatch2.6.17.8
OR
linuxlinux_kernelMatch2.6.17.10
OR
linuxlinux_kernelMatch2.6.17.11
OR
linuxlinux_kernelMatch2.6.17.12
OR
linuxlinux_kernelMatch2.6.17.13
OR
linuxlinux_kernelMatch2.6.17.14
OR
linuxlinux_kernelMatch2.6.18
OR
linuxlinux_kernelMatch2.6.18.1
OR
linuxlinux_kernelMatch2.6.18.3
OR
linuxlinux_kernelMatch2.6.18.4
OR
linuxlinux_kernelMatch2.6.19
OR
linuxlinux_kernelMatch2.6.19.1
OR
linuxlinux_kernelMatch2.6.19.2
OR
linuxlinux_kernelMatch2.6.20
OR
linuxlinux_kernelMatch2.6.20.1
OR
linuxlinux_kernelMatch2.6.20.2
OR
linuxlinux_kernelMatch2.6.20.3
OR
linuxlinux_kernelMatch2.6.20.4
OR
linuxlinux_kernelMatch2.6.20.5
OR
linuxlinux_kernelMatch2.6.20.8
OR
linuxlinux_kernelMatch2.6.20.9
OR
linuxlinux_kernelMatch2.6.20.11
OR
linuxlinux_kernelMatch2.6.20.13
OR
linuxlinux_kernelMatch2.6.20.15
OR
linuxlinux_kernelMatch2.6.21
OR
linuxlinux_kernelMatch2.6.21.1
OR
linuxlinux_kernelMatch2.6.21.2
OR
linuxlinux_kernelMatch2.6.21.4
OR
linuxlinux_kernelMatch2.6.21.6
OR
linuxlinux_kernelMatch2.6.21.7
OR
linuxlinux_kernelMatch2.6.22
OR
linuxlinux_kernelMatch2.6.22.3
OR
linuxlinux_kernelMatch2.6.22.4
OR
linuxlinux_kernelMatch2.6.22.5
OR
linuxlinux_kernelMatch2.6.22.6
OR
linuxlinux_kernelMatch2.6.22.7
OR
linuxlinux_kernelMatch2.6.22.8
OR
linuxlinux_kernelMatch2.6.22.11
OR
linuxlinux_kernelMatch2.6.22.12
OR
linuxlinux_kernelMatch2.6.22.13
OR
linuxlinux_kernelMatch2.6.22.14
OR
linuxlinux_kernelMatch2.6.22.15
OR
linuxlinux_kernelMatch2.6.22.16
OR
linuxlinux_kernelMatch2.6.22.17
OR
linuxlinux_kernelMatch2.6.23
OR
linuxlinux_kernelMatch2.6.23.1
OR
linuxlinux_kernelMatch2.6.23.2
OR
linuxlinux_kernelMatch2.6.23.3
OR
linuxlinux_kernelMatch2.6.23.4
OR
linuxlinux_kernelMatch2.6.23.5
OR
linuxlinux_kernelMatch2.6.23.6
OR
linuxlinux_kernelMatch2.6.23.7
OR
linuxlinux_kernelMatch2.6.23.9
OR
linuxlinux_kernelMatch2.6.23.14
OR
linuxlinux_kernelMatch2.6.24.1
OR
linuxlinux_kernelMatch2.6.24.2
OR
linuxlinux_kernelMatch2.6.25
OR
linuxlinux_kernelMatch2.6.25.1
OR
linuxlinux_kernelMatch2.6.25.2

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

5.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%