Summary: | <net-misc/quagga-1.0.20160315-r4: Buffer Overflow in IPv6 RA handling (CVE-2016-1245) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | pinkbyte |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1386109 | ||
Whiteboard: | C2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() commit 5a041e0100b705ec223a925e656373b9b0e40fa7 Author: Sergey Popov <pinkbyte@gentoo.org> Date: Tue Oct 18 18:25:41 2016 +0300 net-misc/quagga: revision bump Backport upstream security fix for stack overrun in IPv6 RA receive code in zebra daemon. Reported-by: Agostino Sarubbo <ago@gentoo.org> Gentoo-Bug: 597410 Package-Manager: portage-2.3.2 Arches, please test and mark stable =net-misc/quagga-1.0.20160315-r4 Target keywords: alpha amd64 arm hppa ppc sparc x86 amd64 stable x86 stable Stable on alpha. Stable for HPPA. arm stable ppc/sparc stable GLSA request filed Changing rating to C2 to reflect that the default configuration is not affected, i.e. to be affected you have to turn on neighbor discovery by your own (see https://lists.quagga.net/pipermail/quagga-users/2016-October/014478.html). This issue was resolved and addressed in GLSA 201701-48 at https://security.gentoo.org/glsa/201701-48 by GLSA coordinator Aaron Bauman (b-man). |