First published: Wed Jul 02 2008(Updated: )
Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2.6.25.9 | |
openSUSE | =10.3 | |
openSUSE | =11.0 | |
Debian GNU/Linux | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2826 is considered a high severity vulnerability that can lead to denial of service due to resource consumption and potential system outage.
To fix CVE-2008-2826, upgrade to a Linux kernel version 2.6.25.9 or later that includes the security patch.
CVE-2008-2826 affects various versions of the Linux kernel prior to 2.6.25.9, as well as specific distributions like openSUSE 10.3, 11.0, Debian 4.0, and several versions of Ubuntu.
CVE-2008-2826 is caused by an integer overflow in the sctp_getsockopt_local_addrs_old function within the SCTP implementation of the Linux kernel.
CVE-2008-2826 is a local vulnerability, meaning it requires local user access to exploit and cause a denial of service.