From ${URL} : If two router advertisment speaker announce seperate default gateways with infinite timeout the kernel currently packs these routes together into an ecmp route set. If one of the RA speaker now changes the advertised expiration to a lower value and a third route with infinite timeout pops up we end up with a BUG_ON. Remote attacker could use this flaw to crash the system. Fixed by: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=307f2fb95e9b96b3577916e73d92e104f8f26494 Introduced by: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51ebd3181572af8d5076808dab2682d800f6da5d Introduced in upstream version: v3.7-rc1
------------------------------------------------------------------------ r2443 | tomwij | 2013-07-20 19:48:05 +0200 (Sat, 20 Jul 2013) | 1 line Commit security fixes for CVE-2013-4125 (fixes bug #477464), CVE-2013-4127 (fixes bug #477466) and CVE-2013-3129 (fixes bug #477468) to branches 3.8, 3.9, 3.10 and 3.11 were they are present and apply. ------------------------------------------------------------------------
CVE-2013-4125 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4125): The fib6_add_rt2node function in net/ipv6/ip6_fib.c in the IPv6 stack in the Linux kernel through 3.10.1 does not properly handle Router Advertisement (RA) messages in certain circumstances involving three routes that initially qualified for membership in an ECMP route set until a change occurred for one of the first two routes, which allows remote attackers to cause a denial of service (system crash) via a crafted sequence of messages.
Fix in 3.10.4 onward