Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 577156 (CVE-2016-2342) - <net-misc/quagga-1.0.20160315: Buffer overflow in bgpd (CVE-2016-2342)
Summary: <net-misc/quagga-1.0.20160315: Buffer overflow in bgpd (CVE-2016-2342)
Status: RESOLVED FIXED
Alias: CVE-2016-2342
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: https://www.kb.cert.org/vuls/id/270232
Whiteboard: B1 [glsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-03-12 14:51 UTC by Hanno Böck
Modified: 2016-10-10 08:14 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hanno Böck gentoo-dev 2016-03-12 14:51:27 UTC
The latest quagga release fixes a buffer overflow, upstream release notes:
https://lists.quagga.net/pipermail/quagga-users/2016-March/014286.html
Vulnerability info:
https://www.kb.cert.org/vuls/id/270232
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2016-03-13 14:18:22 UTC
CVE-2016-2342 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2342):
  Quagga is a software routing suite that implements numerous routing
  protocols for Unix-based platforms. A memcpy function in the VPNv4 NLRI
  parser of bgp_mplsvpn.c does not properly check the upper-bound length of
  received Labeled-VPN SAFI routes data, which may allow for arbitrary code
  execution on the stack. Note that hosts are only vulnerable if bgpd is
  running with BGP peers enabled for VPNv4, which is not a default
  configuration.
Comment 2 Sergey Popov gentoo-dev 2016-03-16 14:20:25 UTC
commit 2de159243243efbbf0896de1c7d8938a7302da0f
Author: Sergey Popov <pinkbyte@gentoo.org>
Date:   Wed Mar 16 17:16:51 2016 +0300

    net-misc/quagga: version bump

    Gentoo-Bug: 577156

    Package-Manager: portage-2.2.27


Arches, please test and mark stable =net-misc/quagga-1.0.20160315

Target keywords: alpha amd64 arm hppa ppc sparc x86
Comment 3 Agostino Sarubbo gentoo-dev 2016-03-17 11:56:47 UTC
amd64 stable
Comment 4 Tobias Klausmann gentoo-dev 2016-03-17 19:04:54 UTC
Stable on alpha.
Comment 5 Jeroen Roovers (RETIRED) gentoo-dev 2016-03-19 07:24:03 UTC
Stable for HPPA.
Comment 6 Agostino Sarubbo gentoo-dev 2016-03-19 11:40:50 UTC
sparc stable
Comment 7 Markus Meier gentoo-dev 2016-03-24 06:05:26 UTC
arm stable
Comment 8 Agostino Sarubbo gentoo-dev 2016-03-27 10:17:18 UTC
ppc stable
Comment 9 Agostino Sarubbo gentoo-dev 2016-04-11 10:39:23 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 10 Sergey Popov gentoo-dev 2016-04-19 08:04:56 UTC
Old vulnerable versions are masked
Comment 11 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2016-06-07 10:21:44 UTC
The ebuilds must be removed from the tree.  Please let us know when you can remove them.  Thanks.
Comment 12 Sergey Popov gentoo-dev 2016-06-07 13:17:01 UTC
(In reply to Aaron Bauman from comment #11)
> The ebuilds must be removed from the tree.  Please let us know when you can
> remove them.  Thanks.

They must not, they should me removed, but until they are not - we can keep them masked per our policy.

I will keep them masked until quagga team will sort out all problems in new releases. In some OSPF configurations new releases of quagga just crashes, no solution provided for now. 

This particular bug is about vulnerability in bgpd. I think that it is unreasonable to let OSPF users suffer from regression, because of fixing vulnerability in bgpd, which maybe even not used by them
Comment 13 GLSAMaker/CVETool Bot gentoo-dev 2016-10-10 08:14:59 UTC
This issue was resolved and addressed in
 GLSA 201610-03 at https://security.gentoo.org/glsa/201610-03
by GLSA coordinator Aaron Bauman (b-man).