Description
The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1630-1 | New Linux 2.6.18 packages fix several vulnerabilities |
Debian DSA |
DSA-1636-1 | New Linux 2.6.24 packages fix several vulnerabilities |
EUVD |
EUVD-2008-3260 | The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information. |
Ubuntu USN |
USN-637-1 | Linux kernel vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Enterprise Mrg
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T09:28:41.969Z
Reserved: 2008-07-24T00:00:00.000Z
Link: CVE-2008-3272
No data.
Status : Modified
Published: 2008-08-08T18:41:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-3272
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN