bird: CVE-2019-16159

Related Vulnerabilities: CVE-2019-16159  

Debian Bug report logs - #939990
bird: CVE-2019-16159

version graph

Package: src:bird; Maintainer for src:bird is Ondřej Surý <ondrej@debian.org>;

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Tue, 10 Sep 2019 20:06:02 UTC

Severity: grave

Tags: security, upstream

Found in versions bird/1.6.7-1, bird/1.6.6-1

Forwarded to http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Ondřej Surý <ondrej@debian.org>:
Bug#939990; Package src:bird. (Tue, 10 Sep 2019 20:06:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Ondřej Surý <ondrej@debian.org>. (Tue, 10 Sep 2019 20:06:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: bird: CVE-2019-16159
Date: Tue, 10 Sep 2019 22:03:35 +0200
Source: bird
Version: 1.6.7-1
Severity: grave
Tags: security upstream
Forwarded: http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html
Control: found -1 1.6.6-1

Hi,

The following vulnerability was published for bird.

CVE-2019-16159[0]:
| BIRD Internet Routing Daemon 1.6.x through 1.6.7 and 2.x through 2.0.5
| has a stack-based buffer overflow. The BGP daemon's support for RFC
| 8203 administrative shutdown communication messages included an
| incorrect logical expression when checking the validity of an input
| message. Sending a shutdown communication with a sufficient message
| length causes a four-byte overflow to occur while processing the
| message, where two of the overflow bytes are attacker-controlled and
| two are fixed.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-16159
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16159
[1] http://trubka.network.cz/pipermail/bird-users/2019-September/013722.html
[2] http://trubka.network.cz/pipermail/bird-users/2019-September/013720.html
[3] http://trubka.network.cz/pipermail/bird-users/2019-September/013718.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Marked as found in versions bird/1.6.6-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Tue, 10 Sep 2019 20:06:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Ondřej Surý <ondrej@debian.org>:
Bug#939990; Package src:bird. (Wed, 11 Sep 2019 13:24:03 GMT) (full text, mbox, link).


Acknowledgement sent to Ondrej Zajicek <santiago@crfreenet.org>:
Extra info received and forwarded to list. Copy sent to Ondřej Surý <ondrej@debian.org>. (Wed, 11 Sep 2019 13:24:03 GMT) (full text, mbox, link).


Message #12 received at 939990@bugs.debian.org (full text, mbox, reply):

From: Ondrej Zajicek <santiago@crfreenet.org>
To: Salvatore Bonaccorso <carnil@debian.org>, 939990@bugs.debian.org
Subject: Re: Bug#939990: bird: CVE-2019-16159
Date: Wed, 11 Sep 2019 15:15:47 +0200
[Message part 1 (text/plain, inline)]
Hi

For Sid, we plan to release soon version 1.6.8 including bugfix for this
bug.

For Buster, i backported bugfix for this bug and two other important
security-related bugfixes for 1.6.6, available in oz-deb Git branch:

https://gitlab.labs.nic.cz/labs/bird/commits/oz-deb

The fixes are:

ba870cab310c151ae8827907c604900ff5cd4d11
 - Fix this bug (CVE-2019-16159)

37f39789f483afd10bcfadca8b414e951ffb6d22
 - Fix bug in privilege revocation causing BIRD in some cases run with
   more privileges than necessary

2545b91b8b96151b415c4d22b3c4ab3835752540
 - Fix bug allowing easily triggerable crash from CLI

-- 
Ondrej 'Santiago' Zajicek (email: santiago@crfreenet.org)
[signature.asc (application/pgp-signature, inline)]

Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Sep 11 16:45:54 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.