From owner-freebsd-net@FreeBSD.ORG Fri Apr 3 04:06:50 2015 Return-Path: Delivered-To: net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 4A66D9A9 for ; Fri, 3 Apr 2015 04:06:50 +0000 (UTC) Received: from mail-ob0-f180.google.com (mail-ob0-f180.google.com [209.85.214.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0C721BAD for ; Fri, 3 Apr 2015 04:06:49 +0000 (UTC) Received: by obbgh1 with SMTP id gh1so150250109obb.1 for ; Thu, 02 Apr 2015 21:06:43 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=uY1f20CmaJ09ww0i6t0ERKKYocXtICkeKBgu6O0R6Ww=; b=dcwGIlRtQhrlGiArt/IwWd0cwkwdvGPpGW+iwqmJvdqIPU9qMe0HTnTqasOmGwInmO NTF8J7KGsT8+GuvOYNAxjTWDg+9R/oVzPjZ0/QeFWneZ3UNTXKPQignQH8spF+wtjuGn qbHXoArfRmH6IxrsyAaT1G4kSA8ioqIgHVSiWIumWwU5/RMNKxmJ2mehm3e6SpVt+SLX B7I+yhjUQVJYXHZ4OBgZo8AcJG5Ml6VgRLtPoJC7671oGHMSnnrtoDReoKiJzrsK7lPo OFkJTtPsTtUyMF/eKoN2fpaYRWjV9BVnZXuhtTxyaXlmqwWZM7/C9+J7u4LhSMx1uRIL 8Zhw== X-Gm-Message-State: ALoCoQk+kooyi2M6vQTtfxvJVFjAHlX5r6NRikP1m8IeCZC/BGOmNdqi0lfZBASJ5axLZbLFdboz X-Received: by 10.182.19.132 with SMTP id f4mr737527obe.8.1428034003659; Thu, 02 Apr 2015 21:06:43 -0700 (PDT) Received: from jims-mbp.netgate.com (65-36-83-120.static.grandenetworks.net. [65.36.83.120]) by mx.google.com with ESMTPSA id jt2sm6090032oeb.13.2015.04.02.21.06.42 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 02 Apr 2015 21:06:43 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2096\)) Subject: Re: [oss-security] CVE Request : IPv6 Hop limit lowering via RA messages From: Jim Thompson In-Reply-To: Date: Thu, 2 Apr 2015 23:06:43 -0500 Content-Transfer-Encoding: quoted-printable Message-Id: <942E0C08-E883-429E-9F27-22715C00B684@netgate.com> References: To: Eitan Adler X-Mailer: Apple Mail (2.2096) Cc: oss-security@lists.openwall.com, ljungmark@modio.se, FreeBSD Security Team , "freebsd-net@freebsd.org" X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Apr 2015 04:06:50 -0000 have you considered that there might not be a relevant patch because = FreeBSD=E2=80=99s implementation isn=E2=80=99t affected? Jim > On Apr 2, 2015, at 9:15 PM, Eitan Adler wrote: >=20 > + FreeBSD lists since I haven't seen any relevant patches (although I > might have missed them). >=20 > ---------- Forwarded message ---------- > From: D.S. Ljungmark > Date: 2 April 2015 at 10:19 > Subject: [oss-security] CVE Request : IPv6 Hop limit lowering via RA = messages > To: oss-security@lists.openwall.com >=20 >=20 > An unprivileged user on a local network can use IPv6 Neighbour > Discovery ICMP to broadcast a non-route with a low hop limit, this > causing machines to lower the hop limit on existing IPv6 routes. >=20 > Linux Patch: http://www.spinics.net/lists/netdev/msg322361.html > Redhat bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=3D1203712 >=20 > Projects impacted: Linux kernel, NetworkManager, FreeBSD Kernel >=20 >=20 > Regards, > D.S. Ljungmark >=20 >=20 > --=20 > Eitan Adler > _______________________________________________ > freebsd-net@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org"