librdmacm is vulnerable to content spoofing. A static port 6125
is used to connect to the ib_acm
service by default. This allows a local attacker to host a malicious ib_acm
service on the same port to provide incorrect address resolution information to all librmdacm applications.
git.openfabrics.org/git?p=~shefty/librdmacm.git%3Ba=commitdiff%3Bh=4b5c1aa734e0e734fc2ba3cd41d0ddf02170af6d
git.openfabrics.org/git?p=~shefty/librdmacm.git;a=commitdiff;h=4b5c1aa734e0e734fc2ba3cd41d0ddf02170af6d
www.openwall.com/lists/oss-security/2012/10/11/6
www.openwall.com/lists/oss-security/2012/10/11/9
www.securityfocus.com/bid/55896
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=865483
rhn.redhat.com/errata/RHSA-2013-1661.html