Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 493560 (CVE-2013-6431)

Summary: Kernel : net: fib: fib6_add: potential NULL pointer dereference (CVE-2013-6431)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED FIXED    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1039054
Whiteboard:
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2013-12-07 20:02:12 UTC
From ${URL} :

Linux kernel built with the IPv6 protocol(CONFIG_IPv6) along with the IPv6
source address based routing support(CONFIG_IPV6_SUBTREE) is vulnerable to a
NULL pointer dereference flaw. It could occur while doing an ioctl(SIOCADDRT)
call on an IPv6 socket. User would need to have CAP_NET_ADMIN privileges to
perform such a call.

A user/program with CAP_NET_ADMIN privileges could use this flaw to crash a
system resulting in DoS.

Upstream fix:
-------------
 -> https://git.kernel.org/linus/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-12-12 15:20:37 UTC
CVE-2013-6431 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6431):
  The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before
  3.11.5 does not properly implement error-code encoding, which allows local
  users to cause a denial of service (NULL pointer dereference and system
  crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT
  ioctl call.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 16:46:35 UTC
Fix in 3.11.5 onwards