First published: Fri Aug 08 2008(Updated: )
The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.27-rc1 | |
Linux Kernel | <2.6.27 | |
Linux Kernel | =2.6.27 | |
Debian | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Red Hat Enterprise Linux Desktop | =4.0 | |
Red Hat Enterprise Linux Server EUS | =4.7 | |
Red Hat Enterprise Linux Server | =4.0 | |
Red Hat Enterprise Linux Workstation | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3272 has been designated a low to medium severity vulnerability.
To mitigate CVE-2008-3272, upgrade your Linux kernel to version 2.6.27-rc2 or later.
CVE-2008-3272 affects Linux kernel versions prior to 2.6.27-rc2.
CVE-2008-3272 is a local privilege escalation vulnerability and cannot be exploited remotely.
CVE-2008-3272 affects the sound subsystem specifically within the snd_seq_oss_synth_make_info function.