2
Candidate: CVE-2007-6282
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6282
5
https://usn.ubuntu.com/usn/usn-625-1
7
The IPsec implementation in Linux kernel before 2.6.25 allows remote
8
routers to cause a denial of service (crash) via a fragmented ESP packet in
9
which the first fragment does not contain the entire ESP header and IV.
11
Dirk Nehring discovered that the IPsec protocol stack did not correctly
12
handle fragmented ESP packets. A remote attacker could exploit this
13
to crash the system, leading to a denial of service.
17
Discovered-by: Dirk Nehring
20
Patches_linux-source-2.6.15:
21
upstream_linux-source-2.6.15: released (2.6.25~rc9)
22
dapper_linux-source-2.6.15: released (2.6.15-52.69)
23
feisty_linux-source-2.6.15: DNE
24
gutsy_linux-source-2.6.15: DNE
25
hardy_linux-source-2.6.15: DNE
26
devel_linux-source-2.6.15: DNE
28
Patches_linux-source-2.6.20:
29
upstream_linux-source-2.6.20: released (2.6.25~rc9)
30
dapper_linux-source-2.6.20: DNE
31
feisty_linux-source-2.6.20: released (2.6.20-17.37)
32
gutsy_linux-source-2.6.20: DNE
33
hardy_linux-source-2.6.20: DNE
34
devel_linux-source-2.6.20: DNE
36
Patches_linux-source-2.6.22:
37
upstream_linux-source-2.6.22: released (2.6.25~rc9)
38
dapper_linux-source-2.6.22: DNE
39
feisty_linux-source-2.6.22: DNE
40
gutsy_linux-source-2.6.22: released (2.6.22-15.56)
41
hardy_linux-source-2.6.22: DNE
42
devel_linux-source-2.6.22: DNE
45
upstream: 920fc941a9617f95ccb283037fe6f8a38d95bb69 (esp_input)
46
upstream_linux: released (2.6.25~rc9)
50
hardy_linux: released (2.6.24-19.36)
51
devel_linux: not-affected