linux-source-2.6.15⁄2.6.17⁄2.6.20 vulnerabilities

Related Vulnerabilities: CVE-2007-1357   CVE-2007-1388   CVE-2007-1496   CVE-2007-1497   CVE-2007-1592   CVE-2007-1730   CVE-2007-2172  

Philipp Richter discovered that the AppleTalk protocol handler did not sufficiently verify the length of packets. By sending a crafted AppleTalk packet, a remote attacker could exploit this to crash the kernel. (CVE-2007-1357)

Gabriel Campana discovered that the do_ipv6_setsockopt() function did not sufficiently verifiy option values for IPV6_RTHDR. A local attacker could exploit this to trigger a kernel crash. (CVE-2007-1388)

24 May 2007

linux-source-2.6.152.6.172.6.20 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06 LTS

Software Description

Details

Philipp Richter discovered that the AppleTalk protocol handler did not sufficiently verify the length of packets. By sending a crafted AppleTalk packet, a remote attacker could exploit this to crash the kernel. (CVE-2007-1357)

Gabriel Campana discovered that the do_ipv6_setsockopt() function did not sufficiently verifiy option values for IPV6_RTHDR. A local attacker could exploit this to trigger a kernel crash. (CVE-2007-1388)

A Denial of Service vulnerability was discovered in the nfnetlink_log() netfilter function. A remote attacker could exploit this to trigger a kernel crash. (CVE-2007-1496)

The connection tracking module for IPv6 did not properly handle the status field when reassembling fragmented packets, so that the final packet always had the ‘established’ state. A remote attacker could exploit this to bypass intended firewall rules. (CVE-2007-1497)

Masayuki Nakagawa discovered an error in the flowlabel handling of IPv6 network sockets. A local attacker could exploit this to crash the kernel. (CVE-2007-1592)

The do_dccp_getsockopt() function did not sufficiently verify the optlen argument. A local attacker could exploit this to read kernel memory (which might expose sensitive data) or cause a kernel crash. This only affects Ubuntu 7.04. (CVE-2007-1730)

The IPv4 and DECnet network protocol handlers incorrectly declared an array variable so that it became smaller than intended. By sending crafted packets over a netlink socket, a local attacker could exploit this to crash the kernel. (CVE-2007-2172)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.04
linux-image-2.6.20-16-386 - 2.6.20-16.28
linux-image-2.6.20-16-generic - 2.6.20-16.28
linux-image-2.6.20-16-hppa32 - 2.6.20-16.28
linux-image-2.6.20-16-hppa64 - 2.6.20-16.28
linux-image-2.6.20-16-itanium - 2.6.20-16.28
linux-image-2.6.20-16-lowlatency - 2.6.20-16.28
linux-image-2.6.20-16-mckinley - 2.6.20-16.28
linux-image-2.6.20-16-powerpc - 2.6.20-16.28
linux-image-2.6.20-16-powerpc-smp - 2.6.20-16.28
linux-image-2.6.20-16-powerpc64-smp - 2.6.20-16.28
linux-image-2.6.20-16-server - 2.6.20-16.28
linux-image-2.6.20-16-server-bigiron - 2.6.20-16.28
linux-image-2.6.20-16-sparc64 - 2.6.20-16.28
linux-image-2.6.20-16-sparc64-smp - 2.6.20-16.28
Ubuntu 6.10
linux-image-2.6.17-11-386 - 2.6.17.1-11.38
linux-image-2.6.17-11-generic - 2.6.17.1-11.38
linux-image-2.6.17-11-hppa32 - 2.6.17.1-11.38
linux-image-2.6.17-11-hppa64 - 2.6.17.1-11.38
linux-image-2.6.17-11-itanium - 2.6.17.1-11.38
linux-image-2.6.17-11-mckinley - 2.6.17.1-11.38
linux-image-2.6.17-11-powerpc - 2.6.17.1-11.38
linux-image-2.6.17-11-powerpc-smp - 2.6.17.1-11.38
linux-image-2.6.17-11-powerpc64-smp - 2.6.17.1-11.38
linux-image-2.6.17-11-server - 2.6.17.1-11.38
linux-image-2.6.17-11-server-bigiron - 2.6.17.1-11.38
linux-image-2.6.17-11-sparc64 - 2.6.17.1-11.38
linux-image-2.6.17-11-sparc64-smp - 2.6.17.1-11.38
Ubuntu 6.06 LTS
linux-image-2.6.15-28-386 - 2.6.15-28.55
linux-image-2.6.15-28-686 - 2.6.15-28.55
linux-image-2.6.15-28-amd64-generic - 2.6.15-28.55
linux-image-2.6.15-28-amd64-k8 - 2.6.15-28.55
linux-image-2.6.15-28-amd64-server - 2.6.15-28.55
linux-image-2.6.15-28-amd64-xeon - 2.6.15-28.55
linux-image-2.6.15-28-hppa32 - 2.6.15-28.55
linux-image-2.6.15-28-hppa32-smp - 2.6.15-28.55
linux-image-2.6.15-28-hppa64 - 2.6.15-28.55
linux-image-2.6.15-28-hppa64-smp - 2.6.15-28.55
linux-image-2.6.15-28-itanium - 2.6.15-28.55
linux-image-2.6.15-28-itanium-smp - 2.6.15-28.55
linux-image-2.6.15-28-k7 - 2.6.15-28.55
linux-image-2.6.15-28-mckinley - 2.6.15-28.55
linux-image-2.6.15-28-mckinley-smp - 2.6.15-28.55
linux-image-2.6.15-28-powerpc - 2.6.15-28.55
linux-image-2.6.15-28-powerpc-smp - 2.6.15-28.55
linux-image-2.6.15-28-powerpc64-smp - 2.6.15-28.55
linux-image-2.6.15-28-server - 2.6.15-28.55
linux-image-2.6.15-28-server-bigiron - 2.6.15-28.55
linux-image-2.6.15-28-sparc64 - 2.6.15-28.55
linux-image-2.6.15-28-sparc64-smp - 2.6.15-28.55

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system upgrade you need to reboot your computer to effect the necessary changes.

References