<p dir="ltr">OK. This may be a dumb question, but I thought IPv6 did away with fragmentation precisely to prevent such security issues. What happened here?</p>
<div class="gmail_quote">On Dec 10, 2012 8:53 PM, "John Johansen" <<a href="mailto:john.johansen@canonical.com">john.johansen@canonical.com</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
==========================================================================<br>
Ubuntu Security Notice USN-1661-1<br>
December 11, 2012<br>
<br>
linux vulnerability<br>
==========================================================================<br>
<br>
A security issue affects these releases of Ubuntu and its derivatives:<br>
<br>
- Ubuntu 10.04 LTS<br>
<br>
Summary:<br>
<br>
The system's firewall could be bypassed by a remote attacker.<br>
<br>
Software Description:<br>
- linux: Linux kernel<br>
<br>
Details:<br>
<br>
Zhang Zuotao discovered a bug in the Linux kernel's handling of overlapping<br>
fragments in ipv6. A remote attacker could exploit this flaw to bypass<br>
firewalls and initial new network connections that should have been blocked<br>
by the firewall.<br>
<br>
Update instructions:<br>
<br>
The problem can be corrected by updating your system to the following<br>
package versions:<br>
<br>
Ubuntu 10.04 LTS:<br>
linux-image-2.6.32-45-386 2.6.32-45.101<br>
linux-image-2.6.32-45-generic 2.6.32-45.101<br>
linux-image-2.6.32-45-generic-pae 2.6.32-45.101<br>
linux-image-2.6.32-45-ia64 2.6.32-45.101<br>
linux-image-2.6.32-45-lpia 2.6.32-45.101<br>
linux-image-2.6.32-45-powerpc 2.6.32-45.101<br>
linux-image-2.6.32-45-powerpc-smp 2.6.32-45.101<br>
linux-image-2.6.32-45-powerpc64-smp 2.6.32-45.101<br>
linux-image-2.6.32-45-preempt 2.6.32-45.101<br>
linux-image-2.6.32-45-server 2.6.32-45.101<br>
linux-image-2.6.32-45-sparc64 2.6.32-45.101<br>
linux-image-2.6.32-45-sparc64-smp 2.6.32-45.101<br>
linux-image-2.6.32-45-versatile 2.6.32-45.101<br>
linux-image-2.6.32-45-virtual 2.6.32-45.101<br>
<br>
After a standard system update you need to reboot your computer to make<br>
all the necessary changes.<br>
<br>
References:<br>
<a href="http://www.ubuntu.com/usn/usn-1661-1" target="_blank">http://www.ubuntu.com/usn/usn-1661-1</a><br>
CVE-2012-4444<br>
<br>
Package Information:<br>
<a href="https://launchpad.net/ubuntu/+source/linux/2.6.32-45.101" target="_blank">https://launchpad.net/ubuntu/+source/linux/2.6.32-45.101</a><br>
<br>
<br>--<br>
ubuntu-security-announce mailing list<br>
<a href="mailto:ubuntu-security-announce@lists.ubuntu.com">ubuntu-security-announce@lists.ubuntu.com</a><br>
Modify settings or unsubscribe at: <a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce" target="_blank">https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce</a><br>
<br></blockquote></div>