Debian Bug report logs -
#939990
bird: CVE-2019-16159
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Ondřej Surý <ondrej@debian.org>
:
Bug#939990
; Package src:bird
.
(Tue, 10 Sep 2019 20:06:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Ondřej Surý <ondrej@debian.org>
.
(Tue, 10 Sep 2019 20:06:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: bird
Version: 1.6.7-1
Severity: grave
Tags: security upstream
Forwarded: http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html
Control: found -1 1.6.6-1
Hi,
The following vulnerability was published for bird.
CVE-2019-16159[0]:
| BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5
| has a stack-based buffer overflow. The BGP daemon's support for RFC
| 8203 administrative shutdown communication messages included an
| incorrect logical expression when checking the validity of an input
| message. Sending a shutdown communication with a sufficient message
| length causes a four-byte overflow to occur while processing the
| message, where two of the overflow bytes are attacker-controlled and
| two are fixed.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2019-16159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16159
[1] http://trubka.network.cz/pipermail/bird-users/2019-September/013722.html
[2] http://trubka.network.cz/pipermail/bird-users/2019-September/013720.html
[3] http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
Marked as found in versions bird/1.6.6-1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to submit@bugs.debian.org
.
(Tue, 10 Sep 2019 20:06:04 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Ondřej Surý <ondrej@debian.org>
:
Bug#939990
; Package src:bird
.
(Wed, 11 Sep 2019 13:24:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Ondrej Zajicek <santiago@crfreenet.org>
:
Extra info received and forwarded to list. Copy sent to Ondřej Surý <ondrej@debian.org>
.
(Wed, 11 Sep 2019 13:24:03 GMT) (full text, mbox, link).
Message #12 received at 939990@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi
For Sid, we plan to release soon version 1.6.8 including bugfix for this
bug.
For Buster, i backported bugfix for this bug and two other important
security-related bugfixes for 1.6.6, available in oz-deb Git branch:
https://gitlab.labs.nic.cz/labs/bird/commits/oz-deb
The fixes are:
ba870cab310c151ae8827907c604900ff5cd4d11
- Fix this bug (CVE-2019-16159)
37f39789f483afd10bcfadca8b414e951ffb6d22
- Fix bug in privilege revocation causing BIRD in some cases run with
more privileges than necessary
2545b91b8b96151b415c4d22b3c4ab3835752540
- Fix bug allowing easily triggerable crash from CLI
--
Ondrej 'Santiago' Zajicek (email: santiago@crfreenet.org)
[signature.asc (application/pgp-signature, inline)]
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Sep 11 16:45:54 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.