CVE-2005-3848 dst_entry leak Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply." fixed upstream in 2.6.13. Patch: http://linux.bkbits.net:8080/linux-2.6/cset@4304f828jk2FxIJTqMiEOZTNdih6FA discussion: http://marc.theaimsgroup.com/?l=linux-kernel&m=112431016816937&w=2 http://marc.theaimsgroup.com/?l=linux-kernel&m=112439084918917&w=2 http://marc.theaimsgroup.com/?l=linux-kernel&m=112508479212728&w=2
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0101.html
All in attendance at 12-JAN-06 RHEL meeting approved for MUSTFIX list for RHEL4-U3