Summary: | <net-misc/radvd-1.8.2: Multiple vulnerabilities (CVE-2011-{3601,3602,3603,3604,3605}) | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Sean Amoss (RETIRED) <ackle> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | major | CC: | ago, wschlich, xmw | ||||
Priority: | Normal | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://www.openwall.com/lists/oss-security/2011/10/06/3 | ||||||
Whiteboard: | B1 [glsa] | ||||||
Package list: | Runtime testing required: | --- | |||||
Attachments: |
|
Description
Sean Amoss (RETIRED)
![]() ![]() @maintainers: Is there a timeframe for getting a fixed version in the tree? Created attachment 290827 [details, diff]
ebuild.patch
I'm not radvd user, but the daemon starts as well. Tests are welcome from radvd users around.
Comment on attachment 290827 [details, diff]
ebuild.patch
Security updates are not the time to do ebuild cleanups.
+*radvd-1.8.2 (04 Nov 2011) + + 04 Nov 2011; Michael Weber <xmw@gentoo.org> +radvd-1.8.2.ebuild: + Version bump to address security issue bug 381895. + Can I please fast stabilize this new and unaffected version 1.8.2, and remove the old ones? (In reply to comment #5) > Can I please fast stabilize this new and unaffected version 1.8.2, and remove > the old ones? Thank you for the bump, lets do that. Arches, please test and mark stable: =net-misc/radvd-1.8.2 Target keywords : "amd64 arm hppa ppc sparc x86" amd64 ok ppc stable amd64 done. Thanks Agostino x86 stable, thanks! arm stable Stable for HPPA. + 10 Nov 2011; Michael Weber <xmw@gentoo.org> radvd-1.8.2.ebuild: + sparc stable (bug 385967) + Ok, the new version is stabled, i've removed the affected versions from tree. I consider this issue done, but I could't discover any documentation about whiteboard stati to express this. + 10 Nov 2011; Michael Weber <xmw@gentoo.org> -radvd-1.6.ebuild, + -radvd-1.7.ebuild, -radvd-1.8.ebuild, -radvd-1.8.1.ebuild: + Remove security affected versions (bug 385967) + Thanks folks, filed glsa request. (In reply to comment #2) > Created attachment 290827 [details, diff] [details, diff] > ebuild.patch I updated the ebuild as part of bug 386113, thanks This issue was resolved and addressed in GLSA 201111-08 at http://security.gentoo.org/glsa/glsa-201111-08.xml by GLSA coordinator Alex Legler (a3li). CVE-2011-3605 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3605): The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests. CVE-2011-3604 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3604): The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors. CVE-2011-3601 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3601): Buffer overflow in the process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative value in a label_len value. CVE-2011-3603 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3603): The router advertisement daemon (radvd) before 1.8.2 does not properly handle errors in the privsep_init function, which causes the radvd daemon to run as root and has an unspecified impact. CVE-2011-3602 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3602): Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files. |