Source: bird
Version: 1.6.7-1
Severity: grave
Tags: security upstream
Forwarded: 
http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html
Control: found -1 1.6.6-1

Hi,

The following vulnerability was published for bird.

CVE-2019-16159[0]:
| BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5
| has a stack-based buffer overflow. The BGP daemon's support for RFC
| 8203 administrative shutdown communication messages included an
| incorrect logical expression when checking the validity of an input
| message. Sending a shutdown communication with a sufficient message
| length causes a four-byte overflow to occur while processing the
| message, where two of the overflow bytes are attacker-controlled and
| two are fixed.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-16159
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16159
[1] http://trubka.network.cz/pipermail/bird-users/2019-September/013722.html
[2] http://trubka.network.cz/pipermail/bird-users/2019-September/013720.html
[3] http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to