|
Message-ID: <CA+Y=x3nH6AtjW+8VtUQ0DJA2+KXdh1H95Y6dn9yO34UE6Jw6nw@mail.gmail.com> Date: Thu, 18 May 2023 15:44:09 +1000 From: Andrew Worsley <amworsley@...il.com> To: oss-security@...ts.openwall.com Subject: Re: IPv6 and Route of Death I think debian stable/bullseye may not be vulnerable with standard kernel: The exploit write up suggests it requires the ipv6_rpl_srh_compress() routine to be compiled in but from my reading of the code (see https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/include/net/rpl.h) requires CONFIG_IPV6_RPL_LWTUNNEL to be define which isn't in my latest debian amd64 kernel: % grep CONFIG_IPV6_RPL_LWTUNNEL /boot/config-5.10.0-23-amd64 # CONFIG_IPV6_RPL_LWTUNNEL is not set uname -a Linux fast 5.10.0-23-amd64 #1 SMP Debian 5.10.179-1 (2023-05-12) x86_64 GNU/Linux On Thu, 18 May 2023 at 04:35, Erik Auerswald <auerswal@...x-ag.uni-kl.de> wrote: > > Hi all, > > On Wed, May 17, 2023 at 07:13:51PM +0200, Solar Designer wrote: > > On Wed, May 17, 2023 at 10:02:31AM -0400, Jeffrey Walton wrote: > > > This seems to have been dropped as a 0-day. I have not seen a CVE > > > assigned to it. > > > > The "original writeup" you reference says this is CVE-2023-2156. > > > > > I _think_ this is the original writeup: > > > > > > * https://www.interruptlabs.co.uk//articles/linux-ipv6-route-of-death > > It also mentions that "the bug patch didn't solve the underlying problem > (ZDI confirmed this too), so we're still expecting another patch at > some[ ]point." > .... Is this reasonable? Thanks Andrew
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.