Description
Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.
Products
- Linux Kernel 2.2.10
- Linux Kernel 2.2.11
- Linux Kernel 2.2.12
- Linux Kernel 2.2.13
- Linux Kernel 2.2.13
- Linux Kernel 2.2.13 pre15
- Linux Kernel 2.2.14
- Linux Kernel 2.2.15
- Linux Kernel 2.2.15
- Linux Kernel 2.2.15 pre16
- Linux Kernel 2.2.16
- Linux Kernel 2.2.16
- Linux Kernel 2.2.16 pre5
- Linux Kernel 2.2.16 pre6
- Linux Kernel 2.2.17
- Linux Kernel 2.2.17
- Linux Kernel 2.2.17.14
- Linux Kernel 2.2.18
- Linux Kernel 2.2.19
- Linux Kernel 2.2.1
- Linux Kernel 2.2.20
- Linux Kernel 2.2.21
- Linux Kernel 2.2.21
- Linux Kernel 2.2.21 pre1
- Linux Kernel 2.2.21 pre2
- Linux Kernel 2.2.21 pre3
- Linux Kernel 2.2.21 pre4
- Linux Kernel 2.2.21 rc1
- Linux Kernel 2.2.21 rc2
- Linux Kernel 2.2.21 rc3
- Linux Kernel 2.2.21 rc4
- Linux Kernel 2.2.22
- Linux Kernel 2.2.22
- Linux Kernel 2.2.22 rc1
- Linux Kernel 2.2.22 rc2
- Linux Kernel 2.2.22 rc3
- Linux Kernel 2.2.23
- Linux Kernel 2.2.23
- Linux Kernel 2.2.23 rc1
- Linux Kernel 2.2.23 rc2
- Linux Kernel 2.2.2
- Linux Kernel 2.2.3
- Linux Kernel 2.2.4
- Linux Kernel 2.2.4
- Linux Kernel 2.2.4 rc1
- Linux Kernel 2.2.5
- Linux Kernel 2.2.6
- Linux Kernel 2.2.7
- Linux Kernel 2.2.8
- Linux Kernel 2.2.9
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2002-1380, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-1380 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References