A number of buffer overread flaws were found in radvd's process_ra() function due to numerous missed len() checks. This can lead to memory reads outside of the stack, resulting in a crash of radvd. (CVE-2011-3604) This is corrected in upstream git [1]. [1] https://github.com/reubenhwk/radvd/commit/7de1b9abf87b747ee2611c0d2a94dfeee79878b4 Acknowledgements: Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.
The issue affects the version of radvd as shipped in Red Hat Enterprise Linux 4, 5 and 6. This issue affects the version of radvd as shipped in Fedora 14 and 15.
Public via: http://thread.gmane.org/gmane.comp.security.oss.general/5973
Created radvd tracking bugs for this issue Affects: fedora-all [bug 744116]
radvd-1.8.2-2.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
radvd-1.8.2-2.fc14 has been pushed to the Fedora 14 stable repository. If problems still persist, please make note of it in this bug report.
radvd-1.8.2-2.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.