2

USN-869-1: Linux kernel vulnerabilities

view story
linux-howto

http://www.ubuntu.com – Referenced CVEs:  CVE-2009-1298, CVE-2009-4131 Description:  =========================================================== Ubuntu Security Notice USN-869-1 December 10, 2009 linux vulnerability CVE-2009-1298, CVE-2009-4131 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 9.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 9.10: linux-image-2.6.31-16-386 2.6.31-16.53 linux-image-2.6.31-16-generic 2.6.31-16.53 linux-image-2.6.31-16-generic-pae 2.6.31-16.53 linux-image-2.6.31-16-ia64 2.6.31-16.53 linux-image-2.6.31-16-lpia 2.6.31-16.53 linux-image-2.6.31-16-powerpc 2.6.31-16.53 linux-image-2.6.31-16-powerpc-smp 2.6.31-16.53 linux-image-2.6.31-16-powerpc64-smp 2.6.31-16.53 linux-image-2.6.31-16-server 2.6.31-16.53 linux-image-2.6.31-16-sparc64 2.6.31-16.53 linux-image-2.6.31-16-sparc64-smp 2.6.31-16.53 linux-image-2.6.31-16-virtual 2.6.31-16.53 After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: David Ford discovered that the IPv4 defragmentation routine did not correctly handle oversized packets. A remote attacker could send specially crafted traffic that would cause a system to crash, leading to a denial of service. (The fix was included in the earlier kernels from USN-864-1.) (CVE-2009-1298) Akira Fujita discovered that the Ext4 "move extents" ioctl did not correctly check permissions. A local attacker could exploit this to overwrite arbitrary files on the system, leading to root privilege escalation. (CVE-2009-4131) (Distributions)