This flaw affects 2.6 only, but affects RHEL4 due to the backport in ipsec.patch +++ This bug was initially created as a clone of Bug #174345 +++ CVE-2005-3848 dst_entry leak Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply." fixed upstream in 2.6.13. Patch: http://linux.bkbits.net:8080/linux-2.6/cset@4304f828jk2FxIJTqMiEOZTNdih6FA discussion: http://marc.theaimsgroup.com/?l=linux-kernel&m=112431016816937&w=2 http://marc.theaimsgroup.com/?l=linux-kernel&m=112439084918917&w=2 http://marc.theaimsgroup.com/?l=linux-kernel&m=112508479212728&w=2
A fix for this problem has just been committed to the RHEL3 E7 patch pool this evening (in kernel version 2.4.21-37.0.1.EL).
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0140.html
A fix for this problem has also been committed to the RHEL3 U7 patch pool this evening (in kernel version 2.4.21-39.EL).