CVE-2009-1298
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
08/12/2009
Last modified:
09/04/2025
Description
The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function.
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:rc8:*:*:*:*:*:* | 2.6.32 (including) | |
| cpe:2.3:o:linux:linux_kernel:2.6.28:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.28.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommitdiff%3Bh%3Dbbf31bf18d34caa87dd01f08bf713635593697f2
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
- http://secunia.com/advisories/37624
- http://secunia.com/advisories/38017
- http://twitter.com/spendergrsec/statuses/6339560349
- http://wiki.rpath.com/Advisories:rPSA-2009-0161
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A329
- http://www.osvdb.org/60788
- http://www.securityfocus.com/archive/1/508517/100/0/threaded
- http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/
- http://www.ubuntu.com/usn/USN-869-1
- https://bugzilla.redhat.com/show_bug.cgi?id=544144
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00453.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00496.html
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommitdiff%3Bh%3Dbbf31bf18d34caa87dd01f08bf713635593697f2
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
- http://secunia.com/advisories/37624
- http://secunia.com/advisories/38017
- http://twitter.com/spendergrsec/statuses/6339560349
- http://wiki.rpath.com/Advisories:rPSA-2009-0161
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A329
- http://www.osvdb.org/60788
- http://www.securityfocus.com/archive/1/508517/100/0/threaded
- http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/
- http://www.ubuntu.com/usn/USN-869-1
- https://bugzilla.redhat.com/show_bug.cgi?id=544144
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00453.html
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00496.html



