![]() |
|
Date: Thu, 2 Apr 2015 23:06:43 -0500 From: Jim Thompson <jim@...gate.com> To: Eitan Adler <lists@...anadler.com> Cc: FreeBSD Security Team <secteam@...ebsd.org>, "freebsd-net@...ebsd.org" <net@...ebsd.org>, ljungmark@...io.se, oss-security@...ts.openwall.com Subject: Re: CVE Request : IPv6 Hop limit lowering via RA messages have you considered that there might not be a relevant patch because FreeBSD’s implementation isn’t affected? Jim > On Apr 2, 2015, at 9:15 PM, Eitan Adler <lists@...anadler.com> wrote: > > + FreeBSD lists since I haven't seen any relevant patches (although I > might have missed them). > > ---------- Forwarded message ---------- > From: D.S. Ljungmark <ljungmark@...io.se> > Date: 2 April 2015 at 10:19 > Subject: [oss-security] CVE Request : IPv6 Hop limit lowering via RA messages > To: oss-security@...ts.openwall.com > > > An unprivileged user on a local network can use IPv6 Neighbour > Discovery ICMP to broadcast a non-route with a low hop limit, this > causing machines to lower the hop limit on existing IPv6 routes. > > Linux Patch: http://www.spinics.net/lists/netdev/msg322361.html > Redhat bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1203712 > > Projects impacted: Linux kernel, NetworkManager, FreeBSD Kernel > > > Regards, > D.S. Ljungmark > > > -- > Eitan Adler > _______________________________________________ > freebsd-net@...ebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@...ebsd.org"
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.