The linux kernel contains a bug where a fragmented IPv6 packet causes a panic after a timeout (seems to be roughly 60 seconds). This can be triggered remotely via the internet and results in a DoS (kernel panic). The icmp6_send function in net/ipv6/icmp.c in the Linux kernel through 4.8.12 omits a certain check of the dst data structure, which allows remote attackers to cause a denial of service (panic) via a fragmented IPv6 packet. Upstream bug: https://bugzilla.kernel.org/show_bug.cgi?id=189851 Upstream patches: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79dc7e3f1c http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5d41ce29e3 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1d2f7b2d95 CVE assignment: http://seclists.org/oss-sec/2016/q4/641
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1403261]
Statement: This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG-2 as the code with the flaw is not present in the products listed.