Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 15 Jul 2013 18:24:17 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Hannes Frederic Sowa <hannes@...essinduktion.org>
Subject: CVE Request -- Linux kernel: ipv6: BUG_ON in fib6_add_rt2node()

If two router advertisment speaker announce seperate default gateways
with infinite timeout the kernel currently packs these routes together
into an ecmp route set. If one of the RA speaker now changes the
advertised expiration to a lower value and a third route with infinite
timeout pops up we end up with a BUG_ON.

Remote attacker could use this flaw to crash the system.

Fixed by:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=307f2fb95e9b96b3577916e73d92e104f8f26494

Introduced by:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51ebd3181572af8d5076808dab2682d800f6da5d

Introduced in upstream version:
v3.7-rc1

Acknowledgements:

Red Hat would like to thank Hannes Frederic Sowa for reporting this
issue.

-- 
Petr Matousek / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.