Wind River Support Network

HomeOther DownloadsSecurity Advisory - Linux Kernel - CVE-2008-2826
Recommended Type: Patch

Security Advisory - Linux Kernel - CVE-2008-2826

Released: Aug 7, 2008     Updated: Aug 7, 2008

Description

Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2826 IDENTIFIER = WIND00128134


Product Version

Linux Platforms 2.0, Linux Platforms 1.x

Downloads


Installation Notes

Installation Notes

WIND00129081.zip for 1.4
WIND00129082.zip for 1.5
WIND00129083.zip for 2.0

1. Unzip the patch under [install_dir]/updates

2. Install the patch CD by entering the patch CD directory and run setup_linux.

3. This is a source only patch so you will have to build the kernel

4. Issue a make fs and make the kernel in a configured directory.

5. Upload the kernel and rootfs into the target and boot it up.


Live chat
Online