Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply."
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11346
http://www.securityfocus.com/bid/16044
http://www.redhat.com/support/errata/RHSA-2006-0140.html
http://www.redhat.com/support/errata/RHSA-2006-0101.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
http://www.debian.org/security/2006/dsa-1018
http://www.debian.org/security/2006/dsa-1017
http://secunia.com/advisories/19374
http://secunia.com/advisories/19369
http://secunia.com/advisories/19038
http://secunia.com/advisories/18562
http://secunia.com/advisories/18510
http://secunia.com/advisories/18203
http://marc.info/?l=linux-kernel&m=112508479212728&w=2
http://marc.info/?l=linux-kernel&m=112439084918917&w=2
http://marc.info/?l=linux-kernel&m=112431016816937&w=2
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html