Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in radvd
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in radvd
ID: FEDORA-2011-13989
Distribution: Fedora
Plattformen: Fedora 16
Datum: Sa, 5. November 2011, 15:03
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3602
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3603
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3604
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3605
Applikationen: radvd

Originalnachricht

Name        : radvd
Product : Fedora 16
Version : 1.8.2
Release : 2.fc16
URL : http://www.litech.org/radvd/
Summary : A Router Advertisement daemon
Description :
radvd is the router advertisement daemon for IPv6. It listens to router
solicitations and sends router advertisements as described in "Neighbor
Discovery for IP Version 6 (IPv6)" (RFC 2461). With these advertisements
hosts can automatically configure their addresses and some other
parameters. They also can choose a default router based on these
advertisements.

Install radvd if you are setting up IPv6 network and/or Mobile IPv6
services.

---------------------------------------------------------------------------=
-----
Update Information:

update to latest upstream radvd-1.8.2
fixes CVE-2011-3601, CVE-2011-3602, CVE-2011-3603, CVE-2011-3604, CVE-2011-=
3605
---------------------------------------------------------------------------=
-----
References:

[ 1 ] Bug #743748 - CVE-2011-3601 radvd: privilege escalation flaw in pro=
cess_ra()
https://bugzilla.redhat.com/show_bug.cgi?id=3D743748
[ 2 ] Bug #743749 - CVE-2011-3602 radvd: arbitrary file overwrite flaw in=
set_interface_var()
https://bugzilla.redhat.com/show_bug.cgi?id=3D743749
[ 3 ] Bug #743752 - CVE-2011-3603 radvd: daemon would not fail on privsep=
_init() causing it to run with full root privileges
https://bugzilla.redhat.com/show_bug.cgi?id=3D743752
[ 4 ] Bug #743756 - CVE-2011-3604 radvd: numerous buffer overread flaws i=
n process_ra() may lead to crash
https://bugzilla.redhat.com/show_bug.cgi?id=3D743756
[ 5 ] Bug #743758 - CVE-2011-3605 radvd: temporary denial of service flaw=
in process_rs()
https://bugzilla.redhat.com/show_bug.cgi?id=3D743758
---------------------------------------------------------------------------=
-----

This update can be installed with the "yum" update program. Use =

su -c 'yum update radvd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on t=
he
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
---------------------------------------------------------------------------=
-----
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung