Name | CVE-2003-0364 |
Description | The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-311, DSA-332, DSA-336, DSA-442 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
kernel-image-2.2.20-i386 | source | woody | 2.2.20-5woody3 | DSA-336 | ||
kernel-image-2.4.17-s390 | source | woody | 2.4.17-2.woody.3 | DSA-442 | ||
kernel-image-2.4.18-1-i386 | source | woody | 2.4.18-8 | DSA-311 | ||
kernel-image-2.4.18-i386bf | source | woody | 2.4.18-5woody1. | DSA-311 | ||
kernel-patch-2.4.17-mips | source | woody | 2.4.17-0.020226.2.woody2 | DSA-332 | ||
kernel-patch-2.4.17-s390 | source | woody | 0.0.20020816-0.woody.2 | DSA-442 | ||
kernel-source-2.2.20 | source | woody | 2.2.20-5woody2 | DSA-336 | ||
kernel-source-2.4.17 | source | woody | 2.4.17-1woody1 | DSA-332 | ||
kernel-source-2.4.18 | source | woody | 2.4.18-9 | DSA-311 | ||
kernel-source-2.4.27 | source | (unstable) | (not affected) |
- kernel-source-2.4.27 <not-affected> (Fixed before initial upload; 2.4.21-rc6)