Bugzilla – Bug 854173
VUL-1: CVE-2013-6431: kernel: net: fib: fib6_add: potential NULL pointer dereference
Last modified: 2015-02-19 10:30:28 UTC
Public via oss-security: P J P <ppandit@...> 2013-12-06 13:46:01 GMT Linux kernel built with the IPv6 protocol(CONFIG_IPv6) along with the IPv6 source address based routing support(CONFIG_IPV6_SUBTREE) is vulnerable to a NULL pointer dereference flaw. It could occur while doing an ioctl(SIOCADDRT) call on an IPv6 socket. User would need to have CAP_NET_ADMIN privileges to perform such a call. A user/program with CAP_NET_ADMIN privileges could use this flaw to crash a system resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2 References: https://bugzilla.redhat.com/show_bug.cgi?id=1039054 http://comments.gmane.org/gmane.comp.security.oss.general/11624
bugbot adjusting priority
AFAIU, this has been introduced by 4a287eba (IPv6 routing, NLM_F_* flag support: REPLACE and EXCL flags support, warn about missing CREATE flag) which has added ERR_PTR(-ENOENT) return value. This is 3.3 material so TD branches are not affected (same applies to SLE* branches in general).
CVE-2013-6431
Ok, you need CAP_NET_ADMIN so I'm not really shaken with fear but let's apply that trivial fix because it is trivial (talk about trivial tautology :-)). SLE12 has it. oS12.2: doesn't have the buggy commit 188c517a0 which introduced it. oS12.3: applied. oS13.1: has it. Closing.
This is an autogenerated message for OBS integration: This bug (854173) was mentioned in https://build.opensuse.org/request/show/220752 12.3 / kernel-source
openSUSE-SU-2014:0204-1: An update that solves 16 vulnerabilities and has 12 fixes is now available. Category: security (important) Bug References: 804950,805226,808358,811746,825006,831836,838024,840226,840656,844513,848079,848255,849021,849023,849029,849034,849362,852373,852558,852559,853050,853051,853052,853053,854173,854634,854722,860993 CVE References: CVE-2013-0343,CVE-2013-1792,CVE-2013-4348,CVE-2013-4511,CVE-2013-4513,CVE-2013-4514,CVE-2013-4515,CVE-2013-4587,CVE-2013-6367,CVE-2013-6368,CVE-2013-6376,CVE-2013-6378,CVE-2013-6380,CVE-2013-6431,CVE-2013-7027,CVE-2014-0038 Sources used: openSUSE 12.3 (src): kernel-docs-3.7.10-1.28.2, kernel-source-3.7.10-1.28.1, kernel-syms-3.7.10-1.28.1