{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2009-12-03T00:00:00.000Z","descriptions":[{"lang":"en","value":"The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-10T18:57:01.000Z","orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical"},"references":[{"tags":["x_refsource_MISC"],"url":"http://twitter.com/spendergrsec/statuses/6339560349"},{"tags":["x_refsource_CONFIRM"],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=bbf31bf18d34caa87dd01f08bf713635593697f2"},{"name":"SUSE-SA:2010:001","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html"},{"name":"MDVSA-2009:329","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:329"},{"name":"USN-869-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-869-1"},{"name":"FEDORA-2009-12786","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00453.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://wiki.rpath.com/Advisories:rPSA-2009-0161"},{"name":"20091216 rPSA-2009-0161-1 hwdata kernel","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/508517/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/"},{"name":"37624","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/37624"},{"name":"FEDORA-2009-12825","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00496.html"},{"name":"60788","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/60788"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=544144"},{"name":"38017","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/38017"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@ubuntu.com","ID":"CVE-2009-1298","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://twitter.com/spendergrsec/statuses/6339560349","refsource":"MISC","url":"http://twitter.com/spendergrsec/statuses/6339560349"},{"name":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bbf31bf18d34caa87dd01f08bf713635593697f2","refsource":"CONFIRM","url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bbf31bf18d34caa87dd01f08bf713635593697f2"},{"name":"SUSE-SA:2010:001","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html"},{"name":"MDVSA-2009:329","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:329"},{"name":"USN-869-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/USN-869-1"},{"name":"FEDORA-2009-12786","refsource":"FEDORA","url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00453.html"},{"name":"http://wiki.rpath.com/Advisories:rPSA-2009-0161","refsource":"CONFIRM","url":"http://wiki.rpath.com/Advisories:rPSA-2009-0161"},{"name":"20091216 rPSA-2009-0161-1 hwdata kernel","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/508517/100/0/threaded"},{"name":"http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/","refsource":"MISC","url":"http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/"},{"name":"37624","refsource":"SECUNIA","url":"http://secunia.com/advisories/37624"},{"name":"FEDORA-2009-12825","refsource":"FEDORA","url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00496.html"},{"name":"60788","refsource":"OSVDB","url":"http://www.osvdb.org/60788"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=544144","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=544144"},{"name":"38017","refsource":"SECUNIA","url":"http://secunia.com/advisories/38017"},{"name":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32","refsource":"CONFIRM","url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T05:04:49.537Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://twitter.com/spendergrsec/statuses/6339560349"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=bbf31bf18d34caa87dd01f08bf713635593697f2"},{"name":"SUSE-SA:2010:001","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html"},{"name":"MDVSA-2009:329","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:329"},{"name":"USN-869-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-869-1"},{"name":"FEDORA-2009-12786","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00453.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://wiki.rpath.com/Advisories:rPSA-2009-0161"},{"name":"20091216 rPSA-2009-0161-1 hwdata kernel","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/508517/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/"},{"name":"37624","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/37624"},{"name":"FEDORA-2009-12825","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00496.html"},{"name":"60788","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/60788"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=544144"},{"name":"38017","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/38017"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32"}]}]},"cveMetadata":{"assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","assignerShortName":"canonical","cveId":"CVE-2009-1298","datePublished":"2009-12-08T23:00:00.000Z","dateReserved":"2009-04-15T00:00:00.000Z","dateUpdated":"2024-08-07T05:04:49.537Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}