|
Message-ID: <CAF6rxgk6e1rT3prS3SS4FthshnVQdSrrE+bB65ps6Tx30UznAA@mail.gmail.com> Date: Thu, 2 Apr 2015 19:15:45 -0700 From: Eitan Adler <lists@...anadler.com> To: FreeBSD Security Team <secteam@...ebsd.org>, "freebsd-net@...ebsd.org" <net@...ebsd.org>, ljungmark@...io.se, oss-security@...ts.openwall.com Subject: Fwd: CVE Request : IPv6 Hop limit lowering via RA messages + FreeBSD lists since I haven't seen any relevant patches (although I might have missed them). ---------- Forwarded message ---------- From: D.S. Ljungmark <ljungmark@...io.se> Date: 2 April 2015 at 10:19 Subject: [oss-security] CVE Request : IPv6 Hop limit lowering via RA messages To: oss-security@...ts.openwall.com An unprivileged user on a local network can use IPv6 Neighbour Discovery ICMP to broadcast a non-route with a low hop limit, this causing machines to lower the hop limit on existing IPv6 routes. Linux Patch: http://www.spinics.net/lists/netdev/msg322361.html Redhat bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1203712 Projects impacted: Linux kernel, NetworkManager, FreeBSD Kernel Regards, D.S. Ljungmark -- Eitan Adler
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.