|
Message-ID: <20230517171351.GA8234@openwall.com> Date: Wed, 17 May 2023 19:13:51 +0200 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Re: IPv6 and Route of Death Hi Jeffrey and all, On Wed, May 17, 2023 at 10:02:31AM -0400, Jeffrey Walton wrote: > This seems to have been dropped as a 0-day. I have not seen a CVE > assigned to it. The "original writeup" you reference says this is CVE-2023-2156. > I _think_ this is the original writeup: > > * https://www.interruptlabs.co.uk//articles/linux-ipv6-route-of-death Thank you for bringing this to oss-security. I'd appreciate it if you and/or others also post plain text extracts of such content, not only the links. Anyone willing to do it this time? Also, this list isn't only about Linux, so when posting about Linux-specific issues let's state so in the Subject line. In this case, the issue is in Linux kernel and it affects systems with enabled sysctl net.ipv6.conf.*.rpl_seg_enabled for at least some interface(s). Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.