USN-47-1: Linux kernel vulnerabilities

23 December 2004

linux-source-2.6.8.1 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 4.10

Software Description

Details

Georgi Guninski discovered two Denial of Service vulnerabilities in the Linux kernel.

An integer overflow in the vc_resize() function caused the memory allocation for the new screen being too short, thus causing a buffer overflow and a kernel crash.

There was also a memory leak in the ip_options_get() function. Calling ip_cmsg_send() very often would gradually exhaust memory.

Note: The original advisory (see URL above) also mentions a “ip_options_get integer overflow”. This was already fixed in USN-38-1 (known as CAN-2004-1016).

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 4.10
linux-image-2.6.8.1-4-386
linux-image-2.6.8.1-4-686
linux-image-2.6.8.1-4-686-smp
linux-image-2.6.8.1-4-amd64-generic
linux-image-2.6.8.1-4-amd64-k8
linux-image-2.6.8.1-4-amd64-k8-smp
linux-image-2.6.8.1-4-amd64-xeon
linux-image-2.6.8.1-4-k7
linux-image-2.6.8.1-4-k7-smp
linux-image-2.6.8.1-4-power3
linux-image-2.6.8.1-4-power3-smp
linux-image-2.6.8.1-4-power4
linux-image-2.6.8.1-4-power4-smp
linux-image-2.6.8.1-4-powerpc
linux-image-2.6.8.1-4-powerpc-smp

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

References