|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0126 (quagga)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0126: Updated quagga packages fix security vulnerability
Date:  Sat, 26 Mar 2016 16:08:08 +0100
Message-ID:  <20160326150808.806209F640@duvel.mageia.org>

MGASA-2016-0126 - Updated quagga packages fix security vulnerability Publication date: 26 Mar 2016 URL: http://advisories.mageia.org/MGASA-2016-0126.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-2342 Description: A vulnerability was found in a way VPNv4 NLRI parser copied packet data to the stack. Memcpy to stack data structure based on length field from packet data whose length field upper-bound was not properly checked (CVE-2016-2342). References: - https://bugs.mageia.org/show_bug.cgi?id=18060 - https://lists.opensuse.org/opensuse-updates/2016-03/msg00... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2342 SRPMS: - 5/core/quagga-0.99.22.4-4.1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds