Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAF6rxgk6e1rT3prS3SS4FthshnVQdSrrE+bB65ps6Tx30UznAA@mail.gmail.com>
Date: Thu, 2 Apr 2015 19:15:45 -0700
From: Eitan Adler <lists@...anadler.com>
To: FreeBSD Security Team <secteam@...ebsd.org>, "freebsd-net@...ebsd.org" <net@...ebsd.org>, ljungmark@...io.se, 
	oss-security@...ts.openwall.com
Subject: Fwd: CVE Request : IPv6 Hop limit lowering via RA messages

+ FreeBSD lists since I haven't seen any relevant patches (although I
might have missed them).

---------- Forwarded message ----------
From: D.S. Ljungmark <ljungmark@...io.se>
Date: 2 April 2015 at 10:19
Subject: [oss-security] CVE Request : IPv6 Hop limit lowering via RA messages
To: oss-security@...ts.openwall.com


An unprivileged user on a local network can use IPv6 Neighbour
Discovery ICMP to broadcast a non-route with a low hop limit, this
causing machines to lower the hop limit on existing IPv6 routes.

Linux Patch: http://www.spinics.net/lists/netdev/msg322361.html
Redhat bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1203712

Projects impacted:  Linux kernel,  NetworkManager, FreeBSD Kernel


Regards,
  D.S. Ljungmark


-- 
Eitan Adler

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.