CVE
- Id
- 32253
- CVE No.
- CVE-2008-2136
- Status
- Candidate
- Description
- Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
- Phase
- Assigned (20080512)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
348312 | 32253 | CVE-2008-2136 | MLIST:[linux-kernel] 20080509 Re: When should kfree_skb be used? | View |
348313 | 32253 | CVE-2008-2136 | URL:http://marc.info/?l=linux-netdev&m=121031533024912&w=2 | View |
348314 | 32253 | CVE-2008-2136 | CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3 | View |
348315 | 32253 | CVE-2008-2136 | CONFIRM:http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3 | View |
348316 | 32253 | CVE-2008-2136 | CONFIRM:http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0169 | View |
348317 | 32253 | CVE-2008-2136 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2008-362.htm | View |
348318 | 32253 | CVE-2008-2136 | CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.5 | View |
348319 | 32253 | CVE-2008-2136 | DEBIAN:DSA-1588 | View |
348320 | 32253 | CVE-2008-2136 | URL:http://www.debian.org/security/2008/dsa-1588 | View |
348321 | 32253 | CVE-2008-2136 | FEDORA:FEDORA-2008-3949 | View |
348322 | 32253 | CVE-2008-2136 | URL:https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00294.html | View |
348323 | 32253 | CVE-2008-2136 | MANDRIVA:MDVSA-2008:167 | View |
348324 | 32253 | CVE-2008-2136 | URL:http://www.mandriva.com/security/advisories?name=MDVSA-2008:167 | View |
348325 | 32253 | CVE-2008-2136 | MANDRIVA:MDVSA-2008:174 | View |
348326 | 32253 | CVE-2008-2136 | URL:http://www.mandriva.com/security/advisories?name=MDVSA-2008:174 | View |
348327 | 32253 | CVE-2008-2136 | REDHAT:RHSA-2008:0607 | View |
348328 | 32253 | CVE-2008-2136 | URL:http://www.redhat.com/support/errata/RHSA-2008-0607.html | View |
348329 | 32253 | CVE-2008-2136 | REDHAT:RHSA-2008:0612 | View |
348330 | 32253 | CVE-2008-2136 | URL:http://www.redhat.com/support/errata/RHSA-2008-0612.html | View |
348331 | 32253 | CVE-2008-2136 | REDHAT:RHSA-2008:0585 | View |
348332 | 32253 | CVE-2008-2136 | URL:http://www.redhat.com/support/errata/RHSA-2008-0585.html | View |
348333 | 32253 | CVE-2008-2136 | REDHAT:RHSA-2008:0973 | View |
348334 | 32253 | CVE-2008-2136 | URL:http://www.redhat.com/support/errata/RHSA-2008-0973.html | View |
348335 | 32253 | CVE-2008-2136 | REDHAT:RHSA-2008:0787 | View |
348336 | 32253 | CVE-2008-2136 | URL:http://www.redhat.com/support/errata/RHSA-2008-0787.html | View |
348337 | 32253 | CVE-2008-2136 | SUSE:SUSE-SA:2008:030 | View |
348338 | 32253 | CVE-2008-2136 | URL:http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html | View |
348339 | 32253 | CVE-2008-2136 | SUSE:SUSE-SA:2008:032 | View |
348340 | 32253 | CVE-2008-2136 | URL:http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html | View |
348341 | 32253 | CVE-2008-2136 | UBUNTU:USN-625-1 | View |
348342 | 32253 | CVE-2008-2136 | URL:http://www.ubuntu.com/usn/usn-625-1 | View |
348343 | 32253 | CVE-2008-2136 | BID:29235 | View |
348344 | 32253 | CVE-2008-2136 | URL:http://www.securityfocus.com/bid/29235 | View |
348345 | 32253 | CVE-2008-2136 | OVAL:oval:org.mitre.oval:def:11038 | View |
348346 | 32253 | CVE-2008-2136 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11038 | View |
348347 | 32253 | CVE-2008-2136 | OVAL:oval:org.mitre.oval:def:6503 | View |
348348 | 32253 | CVE-2008-2136 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6503 | View |
348349 | 32253 | CVE-2008-2136 | SECUNIA:30499 | View |
348350 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/30499 | View |
348351 | 32253 | CVE-2008-2136 | VUPEN:ADV-2008-1543 | View |
348352 | 32253 | CVE-2008-2136 | URL:http://www.vupen.com/english/advisories/2008/1543/references | View |
348353 | 32253 | CVE-2008-2136 | SECTRACK:1020118 | View |
348354 | 32253 | CVE-2008-2136 | URL:http://www.securitytracker.com/id?1020118 | View |
348355 | 32253 | CVE-2008-2136 | SECUNIA:30198 | View |
348356 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/30198 | View |
348357 | 32253 | CVE-2008-2136 | SECUNIA:30241 | View |
348358 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/30241 | View |
348359 | 32253 | CVE-2008-2136 | SECUNIA:30276 | View |
348360 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/30276 | View |
348361 | 32253 | CVE-2008-2136 | SECUNIA:30368 | View |
348362 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/30368 | View |
348363 | 32253 | CVE-2008-2136 | SECUNIA:30818 | View |
348364 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/30818 | View |
348365 | 32253 | CVE-2008-2136 | SECUNIA:30962 | View |
348366 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/30962 | View |
348367 | 32253 | CVE-2008-2136 | SECUNIA:31107 | View |
348368 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/31107 | View |
348369 | 32253 | CVE-2008-2136 | SECUNIA:31198 | View |
348370 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/31198 | View |
348371 | 32253 | CVE-2008-2136 | SECUNIA:31341 | View |
348372 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/31341 | View |
348373 | 32253 | CVE-2008-2136 | SECUNIA:31628 | View |
348374 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/31628 | View |
348375 | 32253 | CVE-2008-2136 | SECUNIA:31689 | View |
348376 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/31689 | View |
348377 | 32253 | CVE-2008-2136 | SECUNIA:33201 | View |
348378 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/33201 | View |
348379 | 32253 | CVE-2008-2136 | SECUNIA:33280 | View |
348380 | 32253 | CVE-2008-2136 | URL:http://secunia.com/advisories/33280 | View |
348381 | 32253 | CVE-2008-2136 | VUPEN:ADV-2008-1716 | View |
348382 | 32253 | CVE-2008-2136 | URL:http://www.vupen.com/english/advisories/2008/1716/references | View |
348383 | 32253 | CVE-2008-2136 | XF:linux-kernel-ipip6rcv-dos(42451) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
50461 | JVNDB-2008-005771 | rPath Appliance Platform Agent の rootpw プラグインにおけるクロスサイトリクエストフォージェリの脆弱性 | rPath Appliance Platform Agent の rootpw プラグインには、クロスサイトリクエストフォージェリの脆弱性が存在します。 | CVE-2008-2140 | 32253 | 2.6 | http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-005771.html | View |