Dan Rosenberg reported [1] that ax25d does not check the return value of a setuid call responsible for dropping privileges. If the setuid call failed, the daemon would continue to run with root privileges. This has not yet been corrected upstream [2]. [1] http://www.openwall.com/lists/oss-security/2011/08/10/3 [2] http://www.linux-ax25.org/cvsweb/ax25-tools/ax25/ax25d.c
Created ax25-tools tracking bugs for this issue Affects: fedora-all [bug 730784]
A few hours ago Thomas Osterried has checked in a fix for CVE-2011-2910 into linux-ax25.org's CVS archive, see https://www.linux-ax25.org/wiki/CVS for CVS instructions and how to build. No new release tarballs have been created yet (or in the past few eons ...) and due to various other fixes a CVS checkout is currently urgently recommended over the released tarballs.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.