CVE
- Id
- 15052
- CVE No.
- CVE-2005-3848
- Status
- Candidate
- Description
- Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply."
- Phase
- Assigned (20051126)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
116962 | 15052 | CVE-2005-3848 | MLIST:[linux-kernel] 20050817 [PATCH] fix dst_entry leak in icmp_push_reply() | View |
116963 | 15052 | CVE-2005-3848 | URL:http://marc.info/?l=linux-kernel&m=112431016816937&w=2 | View |
116964 | 15052 | CVE-2005-3848 | MLIST:[linux-kernel] 20050818 Re: [PATCH] fix dst_entry leak in icmp_push_reply() | View |
116965 | 15052 | CVE-2005-3848 | URL:http://marc.info/?l=linux-kernel&m=112439084918917&w=2 | View |
116966 | 15052 | CVE-2005-3848 | MLIST:[linux-kernel] 20050826 [PATCH 4/7] [IPV4]: Fix DST leak in icmp_push_reply() | View |
116967 | 15052 | CVE-2005-3848 | URL:http://marc.info/?l=linux-kernel&m=112508479212728&w=2 | View |
116968 | 15052 | CVE-2005-3848 | CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=cb94c62c252796f42bb83fe40960d12f3ea5a82a | View |
116969 | 15052 | CVE-2005-3848 | CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git;a=blob;h=1cf41a8a8db3080c9a9243e77c5c447c8e694f87;hb=9c5fcb99af7c157be45e9d53aeb857ded5211fcd;f=2.6.12.6/fix-dst-leak-in-icmp_push_reply.patch | View |
116970 | 15052 | CVE-2005-3848 | DEBIAN:DSA-1017 | View |
116971 | 15052 | CVE-2005-3848 | URL:http://www.debian.org/security/2006/dsa-1017 | View |
116972 | 15052 | CVE-2005-3848 | DEBIAN:DSA-1018 | View |
116973 | 15052 | CVE-2005-3848 | URL:http://www.debian.org/security/2006/dsa-1018 | View |
116974 | 15052 | CVE-2005-3848 | MANDRIVA:MDKSA-2006:072 | View |
116975 | 15052 | CVE-2005-3848 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:072 | View |
116976 | 15052 | CVE-2005-3848 | REDHAT:RHSA-2006:0101 | View |
116977 | 15052 | CVE-2005-3848 | URL:http://www.redhat.com/support/errata/RHSA-2006-0101.html | View |
116978 | 15052 | CVE-2005-3848 | REDHAT:RHSA-2006:0140 | View |
116979 | 15052 | CVE-2005-3848 | URL:http://www.redhat.com/support/errata/RHSA-2006-0140.html | View |
116980 | 15052 | CVE-2005-3848 | SUSE:SUSE-SA:2006:012 | View |
116981 | 15052 | CVE-2005-3848 | URL:http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html | View |
116982 | 15052 | CVE-2005-3848 | UBUNTU:USN-231-1 | View |
116983 | 15052 | CVE-2005-3848 | URL:http://www.ubuntulinux.org/support/documentation/usn/usn-231-1 | View |
116984 | 15052 | CVE-2005-3848 | BID:16044 | View |
116985 | 15052 | CVE-2005-3848 | URL:http://www.securityfocus.com/bid/16044 | View |
116986 | 15052 | CVE-2005-3848 | OVAL:oval:org.mitre.oval:def:11346 | View |
116987 | 15052 | CVE-2005-3848 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11346 | View |
116988 | 15052 | CVE-2005-3848 | SECUNIA:18203 | View |
116989 | 15052 | CVE-2005-3848 | URL:http://secunia.com/advisories/18203 | View |
116990 | 15052 | CVE-2005-3848 | SECUNIA:18510 | View |
116991 | 15052 | CVE-2005-3848 | URL:http://secunia.com/advisories/18510 | View |
116992 | 15052 | CVE-2005-3848 | SECUNIA:18562 | View |
116993 | 15052 | CVE-2005-3848 | URL:http://secunia.com/advisories/18562 | View |
116994 | 15052 | CVE-2005-3848 | SECUNIA:19038 | View |
116995 | 15052 | CVE-2005-3848 | URL:http://secunia.com/advisories/19038 | View |
116996 | 15052 | CVE-2005-3848 | SECUNIA:19374 | View |
116997 | 15052 | CVE-2005-3848 | URL:http://secunia.com/advisories/19374 | View |
116998 | 15052 | CVE-2005-3848 | SECUNIA:19369 | View |