summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2023-2156
blob: 5fce65f6ffae469a5036382bdaeffde071f7f5cb (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Description: Linux Kernel IPv6 RPL Protocol Reachable Assertion Denial-of-Service Vulnerability
References:
 https://www.zerodayinitiative.com/advisories/ZDI-23-547/
 https://bugzilla.redhat.com/show_bug.cgi?id=2196292#c1
 https://www.interruptlabs.co.uk//articles/linux-ipv6-route-of-death
Notes:
 carnil> From ZDI advisory: "Mitigation: Given the nature of the
 carnil> vulnerability, the only salient mitigation strategy is to
 carnil> restrict interaction with the application." Upstream related
 carnil> commit is 4e006c7a6dac ("net: rpl: fix rpl header size
 carnil> calculation").
 carnil> Exploitng the issue requires rpl_seg_enabled to be enabled
 carnil> (net.ipv6.conf.*.rpl_seg_enabled=1)
 carnil> Fixed as well in 6.3.8 for 6.3.y.
Bugs:
upstream: released (6.4-rc6) [a2f4c143d76b1a47c91ef9bc46907116b111da0b]
6.1-upstream-stable: released (6.1.34) [251b5d68ac4748f210577d84f1cd5a664c54785f]
5.10-upstream-stable: released (5.10.184) [86e3981ff1bc501071100036435683c45aa70958]
4.19-upstream-stable: N/A "Vulnerable code not present"
sid: released (6.3.11-1)
6.1-bookworm-security: released (6.1.37-1)
5.10-bullseye-security: released (5.10.179-2) [bugfix/all/ipv6-rpl-Fix-Route-of-Death.patch]
4.19-buster-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy