Linux kernel built with the IPv6 protocol support(CONFIG_IPv6) is vulnerable to a kernel crash caused by a flood of IPv6 router advertisement(RA) packets. It occurs while processing the IPv6 router advertisement packets. A remote attacker in the same layer 2 segment can use this flaw to crash the kernel on a target system, resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=c88507fbad8055297c1d1e21e599f46960cbee39 Introduced in patch: -------------------- -> https://git.kernel.org/linus/957c665f37007de93ccbe45902a23143724170d0 Reference: ---------- -> http://www.openwall.com/lists/oss-security/2014/03/07/6
Statement: This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1075064]
kernel-3.13.7-200.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.13.7-100.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:0439 https://rhn.redhat.com/errata/RHSA-2014-0439.html