First published: Wed Sep 30 2015(Updated: )
It is reported that when a bridge device is set up with "None" for the boot protocol on a network with working IPv6 stateless configuration the host will receieve a valid SLAAC IPv6 address. This could result in a system being reachable via IPv6 when it is not intended to be.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Virtualization Manager | <=3.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5293 has been classified as a moderate severity vulnerability.
To address CVE-2015-5293, ensure the bridge device is configured correctly and avoid using 'None' for the boot protocol.
CVE-2015-5293 affects Red Hat Enterprise Virtualization Manager versions up to and including 3.6.0.
The impact of CVE-2015-5293 is that it may unintentionally expose a system to IPv6 traffic.
CVE-2015-5293 was reported in 2015.