USN-464-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-464-1

24th May, 2007

linux-source-2.6.15/2.6.17/2.6.20 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06 LTS

Details

Philipp Richter discovered that the AppleTalk protocol handler did
not sufficiently verify the length of packets. By sending a crafted
AppleTalk packet, a remote attacker could exploit this to crash the
kernel. (CVE-2007-1357)

Gabriel Campana discovered that the do_ipv6_setsockopt() function did
not sufficiently verifiy option values for IPV6_RTHDR. A local
attacker could exploit this to trigger a kernel crash. (CVE-2007-1388)

A Denial of Service vulnerability was discovered in the
nfnetlink_log() netfilter function. A remote attacker could exploit
this to trigger a kernel crash. (CVE-2007-1496)

The connection tracking module for IPv6 did not properly handle the
status field when reassembling fragmented packets, so that the final
packet always had the 'established' state. A remote attacker could
exploit this to bypass intended firewall rules. (CVE-2007-1497)

Masayuki Nakagawa discovered an error in the flowlabel handling of
IPv6 network sockets. A local attacker could exploit this to crash
the kernel. (CVE-2007-1592)

The do_dccp_getsockopt() function did not sufficiently verify the
optlen argument. A local attacker could exploit this to read kernel
memory (which might expose sensitive data) or cause a kernel crash.
This only affects Ubuntu 7.04. (CVE-2007-1730)

The IPv4 and DECnet network protocol handlers incorrectly declared
an array variable so that it became smaller than intended. By sending
crafted packets over a netlink socket, a local attacker could exploit
this to crash the kernel. (CVE-2007-2172)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 7.04:
linux-image-2.6.20-16-386 2.6.20-16.28
linux-image-2.6.20-16-powerpc 2.6.20-16.28
linux-image-2.6.20-16-server 2.6.20-16.28
linux-image-2.6.20-16-mckinley 2.6.20-16.28
linux-image-2.6.20-16-sparc64-smp 2.6.20-16.28
linux-image-2.6.20-16-hppa32 2.6.20-16.28
linux-image-2.6.20-16-powerpc64-smp 2.6.20-16.28
linux-image-2.6.20-16-itanium 2.6.20-16.28
linux-image-2.6.20-16-powerpc-smp 2.6.20-16.28
linux-image-2.6.20-16-generic 2.6.20-16.28
linux-image-2.6.20-16-sparc64 2.6.20-16.28
linux-image-2.6.20-16-hppa64 2.6.20-16.28
linux-image-2.6.20-16-lowlatency 2.6.20-16.28
linux-image-2.6.20-16-server-bigiron 2.6.20-16.28
Ubuntu 6.10:
linux-image-2.6.17-11-mckinley 2.6.17.1-11.38
linux-image-2.6.17-11-generic 2.6.17.1-11.38
linux-image-2.6.17-11-hppa32 2.6.17.1-11.38
linux-image-2.6.17-11-server-bigiron 2.6.17.1-11.38
linux-image-2.6.17-11-sparc64-smp 2.6.17.1-11.38
linux-image-2.6.17-11-powerpc 2.6.17.1-11.38
linux-image-2.6.17-11-itanium 2.6.17.1-11.38
linux-image-2.6.17-11-386 2.6.17.1-11.38
linux-image-2.6.17-11-powerpc-smp 2.6.17.1-11.38
linux-image-2.6.17-11-sparc64 2.6.17.1-11.38
linux-image-2.6.17-11-server 2.6.17.1-11.38
linux-image-2.6.17-11-powerpc64-smp 2.6.17.1-11.38
linux-image-2.6.17-11-hppa64 2.6.17.1-11.38
Ubuntu 6.06 LTS:
linux-image-2.6.15-28-amd64-generic 2.6.15-28.55
linux-image-2.6.15-28-sparc64-smp 2.6.15-28.55
linux-image-2.6.15-28-powerpc64-smp 2.6.15-28.55
linux-image-2.6.15-28-hppa32-smp 2.6.15-28.55
linux-image-2.6.15-28-386 2.6.15-28.55
linux-image-2.6.15-28-powerpc 2.6.15-28.55
linux-image-2.6.15-28-hppa64-smp 2.6.15-28.55
linux-image-2.6.15-28-itanium-smp 2.6.15-28.55
linux-image-2.6.15-28-mckinley-smp 2.6.15-28.55
linux-image-2.6.15-28-itanium 2.6.15-28.55
linux-image-2.6.15-28-amd64-server 2.6.15-28.55
linux-image-2.6.15-28-powerpc-smp 2.6.15-28.55
linux-image-2.6.15-28-amd64-k8 2.6.15-28.55
linux-image-2.6.15-28-server-bigiron 2.6.15-28.55
linux-image-2.6.15-28-server 2.6.15-28.55
linux-image-2.6.15-28-hppa64 2.6.15-28.55
linux-image-2.6.15-28-686 2.6.15-28.55
linux-image-2.6.15-28-hppa32 2.6.15-28.55
linux-image-2.6.15-28-mckinley 2.6.15-28.55
linux-image-2.6.15-28-k7 2.6.15-28.55
linux-image-2.6.15-28-amd64-xeon 2.6.15-28.55
linux-image-2.6.15-28-sparc64 2.6.15-28.55

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

References

CVE-2007-1357, CVE-2007-1388, CVE-2007-1496, CVE-2007-1497, CVE-2007-1592, CVE-2007-1730, CVE-2007-2172