Source: quagga Version: 0.99.22.4-1 Severity: grave Tags: security upstream patch fixed-upstream
Hi, the following vulnerability was published for quagga. CVE-2016-2342[0]: | The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI | parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 | configuration is used, relies on a Labeled-VPN SAFI routes-data length | field during a data copy, which allows remote attackers to execute | arbitrary code or cause a denial of service (stack-based buffer | overflow) via a crafted packet. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2016-2342 [1] http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=a3bc7e9400b214a0f078fdb19596ba54214a1442 Regards, Salvatore