USN-464-1: Linux kernel vulnerabilities
24 May 2007
Linux kernel vulnerabilities
Releases
Details
Philipp Richter discovered that the AppleTalk protocol handler did
not sufficiently verify the length of packets. By sending a crafted
AppleTalk packet, a remote attacker could exploit this to crash the
kernel. (CVE-2007-1357)
Gabriel Campana discovered that the do_ipv6_setsockopt() function did
not sufficiently verifiy option values for IPV6_RTHDR. A local
attacker could exploit this to trigger a kernel crash. (CVE-2007-1388)
A Denial of Service vulnerability was discovered in the
nfnetlink_log() netfilter function. A remote attacker could exploit
this to trigger a kernel crash. (CVE-2007-1496)
The connection tracking module for IPv6 did not properly handle the
status field when reassembling fragmented packets, so that the final
packet always had the 'established' state. A remote attacker could
exploit this to bypass intended firewall rules. (CVE-2007-1497)
Masayuki Nakagawa discovered an error in the flowlabel handling of
IPv6 network sockets. A local attacker could exploit this to crash
the kernel. (CVE-2007-1592)
The do_dccp_getsockopt() function did not sufficiently verify the
optlen argument. A local attacker could exploit this to read kernel
memory (which might expose sensitive data) or cause a kernel crash.
This only affects Ubuntu 7.04. (CVE-2007-1730)
The IPv4 and DECnet network protocol handlers incorrectly declared
an array variable so that it became smaller than intended. By sending
crafted packets over a netlink socket, a local attacker could exploit
this to crash the kernel. (CVE-2007-2172)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 7.04
-
linux-image-2.6.20-16-386
-
2.6.20-16.28
-
linux-image-2.6.20-16-powerpc
-
2.6.20-16.28
-
linux-image-2.6.20-16-server
-
2.6.20-16.28
-
linux-image-2.6.20-16-mckinley
-
2.6.20-16.28
-
linux-image-2.6.20-16-sparc64-smp
-
2.6.20-16.28
-
linux-image-2.6.20-16-hppa32
-
2.6.20-16.28
-
linux-image-2.6.20-16-powerpc64-smp
-
2.6.20-16.28
-
linux-image-2.6.20-16-itanium
-
2.6.20-16.28
-
linux-image-2.6.20-16-powerpc-smp
-
2.6.20-16.28
-
linux-image-2.6.20-16-generic
-
2.6.20-16.28
-
linux-image-2.6.20-16-sparc64
-
2.6.20-16.28
-
linux-image-2.6.20-16-hppa64
-
2.6.20-16.28
-
linux-image-2.6.20-16-lowlatency
-
2.6.20-16.28
-
linux-image-2.6.20-16-server-bigiron
-
2.6.20-16.28
Ubuntu 6.10
-
linux-image-2.6.17-11-mckinley
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-generic
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-hppa32
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-server-bigiron
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-sparc64-smp
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-powerpc
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-itanium
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-386
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-powerpc-smp
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-sparc64
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-server
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-powerpc64-smp
-
2.6.17.1-11.38
-
linux-image-2.6.17-11-hppa64
-
2.6.17.1-11.38
Ubuntu 6.06
-
linux-image-2.6.15-28-amd64-generic
-
2.6.15-28.55
-
linux-image-2.6.15-28-sparc64-smp
-
2.6.15-28.55
-
linux-image-2.6.15-28-powerpc64-smp
-
2.6.15-28.55
-
linux-image-2.6.15-28-hppa32-smp
-
2.6.15-28.55
-
linux-image-2.6.15-28-386
-
2.6.15-28.55
-
linux-image-2.6.15-28-powerpc
-
2.6.15-28.55
-
linux-image-2.6.15-28-hppa64-smp
-
2.6.15-28.55
-
linux-image-2.6.15-28-itanium-smp
-
2.6.15-28.55
-
linux-image-2.6.15-28-mckinley-smp
-
2.6.15-28.55
-
linux-image-2.6.15-28-itanium
-
2.6.15-28.55
-
linux-image-2.6.15-28-amd64-server
-
2.6.15-28.55
-
linux-image-2.6.15-28-powerpc-smp
-
2.6.15-28.55
-
linux-image-2.6.15-28-amd64-k8
-
2.6.15-28.55
-
linux-image-2.6.15-28-server-bigiron
-
2.6.15-28.55
-
linux-image-2.6.15-28-server
-
2.6.15-28.55
-
linux-image-2.6.15-28-hppa64
-
2.6.15-28.55
-
linux-image-2.6.15-28-686
-
2.6.15-28.55
-
linux-image-2.6.15-28-hppa32
-
2.6.15-28.55
-
linux-image-2.6.15-28-mckinley
-
2.6.15-28.55
-
linux-image-2.6.15-28-k7
-
2.6.15-28.55
-
linux-image-2.6.15-28-amd64-xeon
-
2.6.15-28.55
-
linux-image-2.6.15-28-sparc64
-
2.6.15-28.55
After a standard system upgrade you need to reboot your computer to
effect the necessary changes.