oss-sec mailing list archives
Re: IPv6 and Route of Death
From: Andrew Worsley <amworsley () gmail com>
Date: Thu, 18 May 2023 15:44:09 +1000
I think debian stable/bullseye may not be vulnerable with standard kernel: The exploit write up suggests it requires the ipv6_rpl_srh_compress() routine to be compiled in but from my reading of the code (see https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/include/net/rpl.h) requires CONFIG_IPV6_RPL_LWTUNNEL to be define which isn't in my latest debian amd64 kernel: % grep CONFIG_IPV6_RPL_LWTUNNEL /boot/config-5.10.0-23-amd64 # CONFIG_IPV6_RPL_LWTUNNEL is not set uname -a Linux fast 5.10.0-23-amd64 #1 SMP Debian 5.10.179-1 (2023-05-12) x86_64 GNU/Linux On Thu, 18 May 2023 at 04:35, Erik Auerswald <auerswal () unix-ag uni-kl de> wrote:
Hi all, On Wed, May 17, 2023 at 07:13:51PM +0200, Solar Designer wrote:On Wed, May 17, 2023 at 10:02:31AM -0400, Jeffrey Walton wrote:This seems to have been dropped as a 0-day. I have not seen a CVE assigned to it.The "original writeup" you reference says this is CVE-2023-2156.I _think_ this is the original writeup: * https://www.interruptlabs.co.uk//articles/linux-ipv6-route-of-deathIt also mentions that "the bug patch didn't solve the underlying problem (ZDI confirmed this too), so we're still expecting another patch at some[ ]point."
.... Is this reasonable? Thanks Andrew
Current thread:
- IPv6 and Route of Death Jeffrey Walton (May 17)
- Re: IPv6 and Route of Death Barry Greene (May 17)
- Re: IPv6 and Route of Death Solar Designer (May 17)
- Re: IPv6 and Route of Death Erik Auerswald (May 17)
- Re: IPv6 and Route of Death Andrew Worsley (May 18)
- Re: IPv6 and Route of Death Dominique Martinet (May 19)
- Re: IPv6 and Route of Death Erik Auerswald (May 17)