USN-464-1: Linux kernel vulnerabilities

24 May 2007

Linux kernel vulnerabilities

Releases

Details

Philipp Richter discovered that the AppleTalk protocol handler did
not sufficiently verify the length of packets. By sending a crafted
AppleTalk packet, a remote attacker could exploit this to crash the
kernel. (CVE-2007-1357)

Gabriel Campana discovered that the do_ipv6_setsockopt() function did
not sufficiently verifiy option values for IPV6_RTHDR. A local
attacker could exploit this to trigger a kernel crash. (CVE-2007-1388)

A Denial of Service vulnerability was discovered in the
nfnetlink_log() netfilter function. A remote attacker could exploit
this to trigger a kernel crash. (CVE-2007-1496)

The connection tracking module for IPv6 did not properly handle the
status field when reassembling fragmented packets, so that the final
packet always had the 'established' state. A remote attacker could
exploit this to bypass intended firewall rules. (CVE-2007-1497)

Masayuki Nakagawa discovered an error in the flowlabel handling of
IPv6 network sockets. A local attacker could exploit this to crash
the kernel. (CVE-2007-1592)

The do_dccp_getsockopt() function did not sufficiently verify the
optlen argument. A local attacker could exploit this to read kernel
memory (which might expose sensitive data) or cause a kernel crash.
This only affects Ubuntu 7.04. (CVE-2007-1730)

The IPv4 and DECnet network protocol handlers incorrectly declared
an array variable so that it became smaller than intended. By sending
crafted packets over a netlink socket, a local attacker could exploit
this to crash the kernel. (CVE-2007-2172)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.04
  • linux-image-2.6.20-16-386 - 2.6.20-16.28
  • linux-image-2.6.20-16-generic - 2.6.20-16.28
  • linux-image-2.6.20-16-hppa32 - 2.6.20-16.28
  • linux-image-2.6.20-16-hppa64 - 2.6.20-16.28
  • linux-image-2.6.20-16-itanium - 2.6.20-16.28
  • linux-image-2.6.20-16-lowlatency - 2.6.20-16.28
  • linux-image-2.6.20-16-mckinley - 2.6.20-16.28
  • linux-image-2.6.20-16-powerpc - 2.6.20-16.28
  • linux-image-2.6.20-16-powerpc-smp - 2.6.20-16.28
  • linux-image-2.6.20-16-powerpc64-smp - 2.6.20-16.28
  • linux-image-2.6.20-16-server - 2.6.20-16.28
  • linux-image-2.6.20-16-server-bigiron - 2.6.20-16.28
  • linux-image-2.6.20-16-sparc64 - 2.6.20-16.28
  • linux-image-2.6.20-16-sparc64-smp - 2.6.20-16.28
Ubuntu 6.10
  • linux-image-2.6.17-11-386 - 2.6.17.1-11.38
  • linux-image-2.6.17-11-generic - 2.6.17.1-11.38
  • linux-image-2.6.17-11-hppa32 - 2.6.17.1-11.38
  • linux-image-2.6.17-11-hppa64 - 2.6.17.1-11.38
  • linux-image-2.6.17-11-itanium - 2.6.17.1-11.38
  • linux-image-2.6.17-11-mckinley - 2.6.17.1-11.38
  • linux-image-2.6.17-11-powerpc - 2.6.17.1-11.38
  • linux-image-2.6.17-11-powerpc-smp - 2.6.17.1-11.38
  • linux-image-2.6.17-11-powerpc64-smp - 2.6.17.1-11.38
  • linux-image-2.6.17-11-server - 2.6.17.1-11.38
  • linux-image-2.6.17-11-server-bigiron - 2.6.17.1-11.38
  • linux-image-2.6.17-11-sparc64 - 2.6.17.1-11.38
  • linux-image-2.6.17-11-sparc64-smp - 2.6.17.1-11.38
Ubuntu 6.06
  • linux-image-2.6.15-28-386 - 2.6.15-28.55
  • linux-image-2.6.15-28-686 - 2.6.15-28.55
  • linux-image-2.6.15-28-amd64-generic - 2.6.15-28.55
  • linux-image-2.6.15-28-amd64-k8 - 2.6.15-28.55
  • linux-image-2.6.15-28-amd64-server - 2.6.15-28.55
  • linux-image-2.6.15-28-amd64-xeon - 2.6.15-28.55
  • linux-image-2.6.15-28-hppa32 - 2.6.15-28.55
  • linux-image-2.6.15-28-hppa32-smp - 2.6.15-28.55
  • linux-image-2.6.15-28-hppa64 - 2.6.15-28.55
  • linux-image-2.6.15-28-hppa64-smp - 2.6.15-28.55
  • linux-image-2.6.15-28-itanium - 2.6.15-28.55
  • linux-image-2.6.15-28-itanium-smp - 2.6.15-28.55
  • linux-image-2.6.15-28-k7 - 2.6.15-28.55
  • linux-image-2.6.15-28-mckinley - 2.6.15-28.55
  • linux-image-2.6.15-28-mckinley-smp - 2.6.15-28.55
  • linux-image-2.6.15-28-powerpc - 2.6.15-28.55
  • linux-image-2.6.15-28-powerpc-smp - 2.6.15-28.55
  • linux-image-2.6.15-28-powerpc64-smp - 2.6.15-28.55
  • linux-image-2.6.15-28-server - 2.6.15-28.55
  • linux-image-2.6.15-28-server-bigiron - 2.6.15-28.55
  • linux-image-2.6.15-28-sparc64 - 2.6.15-28.55
  • linux-image-2.6.15-28-sparc64-smp - 2.6.15-28.55

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.