Jump to content

Vulnerability in Linux kernel IPv6 stack allowing remote code execution

Recommended Posts

Information about a vulnerability (CVE-2023-6200 (https://security-tracker.debian.org/tracker/CVE-2023-6200)) in the Linux kernel networking stack has been disclosed. Under certain circumstances, it allows a local network attacker to achieve code execution by sending a specially crafted ICMPv6 packet with an RA (Router Advertisement) message designed to announce information about a router.

The vulnerability occurs on systems with IPv6 support enabled and the sysctl parameter "net.ipv6.conf.<network_interface_name>.accept_ra" active (you can check it with the command "sysctl net.ipv6.conf| grep accept_ra"), which is disabled by default in RHEL and Ubuntu for external network interfaces, but enabled for the loopback interface, allowing an attack from the same system.

The vulnerability has been present since branch 6.6 and has been fixed in versions 6.6.9 and 6.7. Distributions that ship packages with kernel 6.6 include Arch Linux, Gentoo, Fedora, Slackware, OpenMandriva, and Manjaro.

Link to comment
Share on other sites

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...

Important Information

By using this site you automatically agree to the Privacy Policy | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.