Ubuntu 4.10 : linux-source-22.214.171.124 vulnerabilities (USN-47-1)
Low Nessus Plugin ID 20664
SynopsisThe remote Ubuntu host is missing one or more security-related patches.
DescriptionGeorgi Guninski discovered two Denial of Service vulnerabilities in the Linux kernel.
An integer overflow in the vc_resize() function caused the memory allocation for the new screen being too short, thus causing a buffer overflow and a kernel crash.
There was also a memory leak in the ip_options_get() function. Calling ip_cmsg_send() very often would gradually exhaust memory.
Note: The original advisory (see URL above) also mentions a 'ip_options_get integer overflow'. This was already fixed in USN-38-1 (known as CAN-2004-1016).
Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected packages.