Source: bird
Version: 1.6.3-2
Severity: critical
Tags: security

According to the upstream website[1] and changelog[2], bird release 1.6.4
includes an "important security bugfix".

The changelog mentions "Filter: Fixed stack overflow in BGP mask
expressions". A quick scan through the git history revealed a few
commits that mention overflow and use after free fixes:

e8bc64e308586b6502090da2775af84cd760ed0d
        Filter: make bgpmask literals real constructors
30c734fc73648e4c43af4f45e68ac2de3d7ddea1
        Static: Fix bug in static route filter expressions

Probably the best is to ask upstream about security relevant commits and
consider to either backport them to stretch-backports. Another option
would be to upload 1.6.4 to stretch-security as 1.6.4-0+deb9u1.

Cheers
 jonas

[1] http://bird.network.cz/
[2] https://gitlab.labs.nic.cz/labs/bird/blob/v1.6.4/NEWS#L11

-- System Information:
Debian Release: 9.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-6-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_US.UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set 
to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Reply via email to