First published: Wed Jul 09 2008(Updated: )
The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2.6.25.10 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Novell Linux Desktop | =9 | |
openSUSE | =11.0 | |
openSUSE | =10.3 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Desktop | =10-sp2 | |
SUSE Linux Enterprise Desktop | =10-sp1 | |
SUSE Linux Enterprise Server | =10-sp1 | |
Debian | =4.0 | |
Avaya Message Networking | =3.1 | |
Avaya Aura SIP Enablement Services | =4.0 | |
Avaya Modular Messaging Message Storage Server | =4.0 | |
Avaya Proactive Contact | =4.0 | |
Avaya Meeting Exchange | =5.0 | |
Avaya Expanded Meet-me Conferencing | ||
Avaya Intuity Audix LX | =2.0 | |
Avaya Aura SIP Enablement Services | ||
Avaya Aura Communication Manager | >=3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2812 is classified as a high severity vulnerability due to its potential to cause system crashes and privilege escalation.
To fix CVE-2008-2812, update the Linux kernel to version 2.6.25.10 or later as specified in the vulnerability report.
CVE-2008-2812 affects several Linux distributions including Ubuntu 6.06, 7.04, 7.10, 8.04, and openSUSE 10.3 and 11.0.
CVE-2008-2812 primarily allows local users to exploit the vulnerability, making remote exploitation unlikely.
The impacts of CVE-2008-2812 include potential system crashes and unauthorized privilege escalation.