Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 17 May 2016 20:40:37 +0200
From: Cedric Buissart <>
Subject: RHSA-2016:1086 libndp: denial of service due to insufficient
 validation of source of NDP messages

Dear all,

An improper input validation check, and improper origin check flaw during
the reception of NDP message was discovered in libndp. An attacker in a
non local network could use this flaw to advertise a node as a router, and
cause a denial of service attack, or act as a man in the middle.

The patches enforce that hop limit must be 255, to ensure that the NDP
has not been routed.

Patches can be found upsteam:

 -  libndp: validate the IPv6 hop limit

 -  libndb: reject redirect and router advertisements from non-link-local

Known affected packages : NetworkManager >= 1.0

Thanks to Julien Bernard (Viagénie) for discovering the issue

Kind regards,
Cedric Buissart
Purkynova 99
Brno 612 45

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.