diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2009-05-19 08:47:08 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2009-05-19 08:47:08 +0000 |
commit | 5b0bac9146483449f7f28f0a51973e0f979d7f3a (patch) | |
tree | 9ab53d634307786279638cd4ca0cd84d91d62356 /retired/CVE-2007-6282 | |
parent | 13da2825250d11d8afee4bccdd22fc80ee09ab6d (diff) |
retire issue
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1376 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2007-6282')
-rw-r--r-- | retired/CVE-2007-6282 | 19 |
1 files changed, 19 insertions, 0 deletions
diff --git a/retired/CVE-2007-6282 b/retired/CVE-2007-6282 new file mode 100644 index 00000000..10581fb1 --- /dev/null +++ b/retired/CVE-2007-6282 @@ -0,0 +1,19 @@ +Candidate: CVE-2007-6282 +Description: + The IPsec implementation in Linux kernel before 2.6.25 allows remote + routers to cause a denial of service (crash) via a fragmented ESP packet in + which the first fragment does not contain the entire ESP header and IV. +References: +Ubuntu-Description: +Notes: + kees> linux-2.6: 920fc941a9617f95ccb283037fe6f8a38d95bb69 +Bugs: +upstream: released (2.6.25) +linux-2.6: released (2.6.25-1) +2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/esp-iv-in-linear-part-of-skb.patch] +2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/esp-iv-in-linear-part-of-skb.patch] +2.6.26-lenny-security: N/A +2.6.15-dapper-security: released (2.6.15-52.69) +2.6.20-feisty-security: released (2.6.20-17.37) +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) |