The (1) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c and the (2) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3, omit some virtual-address range (aka span) checks when the mmap MAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mmap calls.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/42681 | vdb entry |
http://secunia.com/advisories/30368 | third party advisory vendor advisory |
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.5 | |
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3 | |
http://www.vupen.com/english/advisories/2008/1716/references | vdb entry |
http://www.securitytracker.com/id?1020119 | vdb entry |
http://secunia.com/advisories/30499 | third party advisory |
http://www.debian.org/security/2008/dsa-1588 | vendor advisory |
http://www.securityfocus.com/bid/29397 | vdb entry |
http://secunia.com/advisories/31107 | third party advisory |
http://kerneltrap.org/mailarchive/git-commits-head/2008/5/8/1760604 | mailing list exploit |
http://www.ubuntu.com/usn/usn-625-1 | vendor advisory |