| Summary: | openslp new security issue CVE-2016-4912 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, lewyssmith, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/690416/ | ||
| Whiteboard: | MGA5-64-OK MGA5-32-OK advisory | ||
| Source RPM: | openslp-2.0.0-5.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2016-06-01 17:11:02 CEST
Dave Since you did Bug 7081 on this, and seemed to know what it was about, could you possibly have a look at this one? Your previous test did not look onerous. I have added you to the CC list in hope. TIA CC:
(none) =>
davidwhodgins, lewyssmith
David Walser
2016-06-08 21:03:29 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/690416/ Using virtualbox m5 i586 and x86_64 guests for the test. In both systems, which are using 196.168.10 addresses, the hostnames/ip addresses are defined in bind, running on the host ... # cat /etc/shorewall/rules.drakx ACCEPT net:192.168.0.0/16 fw Installed openslp and ran service slpd start. Then ... # slptool findsrvs service:service-agent service:service-agent://192.168.10.117,65535 service:service-agent://192.168.10.116,65535 Same output on both guests, except order reversed. Installed the update, and confirmed output is the same. Advisory committed to svn. Validating the update. Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0222.html Status:
NEW =>
RESOLVED |