[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20190919205324.wh7q7zjl5fuwy7sc@seger.debian.org>
Date: Thu, 19 Sep 2019 20:53:24 +0000
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4528-1] bird security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4528-1 security@...ian.org
https://www.debian.org/security/ Moritz Muehlenhoff
September 19, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : bird
CVE ID : CVE-2019-16159
Daniel McCarney discovered that the BIRD internet routing daemon
incorrectly validated RFC 8203 messages in it's BGP daemon, resulting
in a stack buffer overflow.
For the stable distribution (buster), this problem has been fixed in
version 1.6.6-1+deb10u1. In addition this update fixes an incomplete
revocation of privileges and a crash triggerable via the CLI (the latter
two bugs are also fixed in the oldstable distribution (stretch) which is
not affected by CVE-2019-16159).
We recommend that you upgrade your bird packages.
For the detailed security status of bird please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bird
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----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=3CFw
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists