Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 15 Jul 2013 10:53:31 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com,
        Hannes Frederic Sowa <hannes@...essinduktion.org>
Subject: Re: CVE Request -- Linux kernel: ipv6: BUG_ON in fib6_add_rt2node()

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/15/2013 10:24 AM, Petr Matousek wrote:
> If two router advertisment speaker announce seperate default
> gateways with infinite timeout the kernel currently packs these
> routes together into an ecmp route set. If one of the RA speaker
> now changes the advertised expiration to a lower value and a third
> route with infinite timeout pops up we end up with a BUG_ON.
> 
> Remote attacker could use this flaw to crash the system.
> 
> Fixed by: 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=307f2fb95e9b96b3577916e73d92e104f8f26494
>
>  Introduced by: 
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51ebd3181572af8d5076808dab2682d800f6da5d
>
>  Introduced in upstream version: v3.7-rc1
> 
> Acknowledgements:
> 
> Red Hat would like to thank Hannes Frederic Sowa for reporting
> this issue.
> 

Please use CVE-2013-4125 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=l/xc
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ