Your submission was sent successfully! Close

CVE-2007-6282

Published: 08 May 2008

The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.

From the Ubuntu security team

Dirk Nehring discovered that the IPsec protocol stack did not correctly handle fragmented ESP packets. A remote attacker could exploit this to crash the system, leading to a denial of service.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.25~rc9)
Patches:
upstream: 920fc941a9617f95ccb283037fe6f8a38d95bb69 (esp_input)
linux-source-2.6.15
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.25~rc9)
linux-source-2.6.20
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.25~rc9)
linux-source-2.6.22
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.25~rc9)