From mboxrd@z Thu Jan 1 00:00:00 1970 From: Peter Korsgaard Date: Tue, 15 Mar 2016 20:56:31 +0100 Subject: [Buildroot] [PATCH] quagga: security bump to version 1.0.20160309 In-Reply-To: <46743f76247ed0f41bf1b3a77bbd967736b6765e.1458058320.git.baruch@tkos.co.il> (Baruch Siach's message of "Tue, 15 Mar 2016 18:12:00 +0200") References: <46743f76247ed0f41bf1b3a77bbd967736b6765e.1458058320.git.baruch@tkos.co.il> Message-ID: <87vb4na51s.fsf@dell.be.48ers.dk> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: buildroot@busybox.net >>>>> "Baruch" == Baruch Siach writes: > Fixes CVE-2016-2342 (AKA VU#270232): Quagga bgpd with BGP peers enabled for > VPNv4 contains a buffer overflow vulnerability. > Remove the --enable-babeld and --enable-opaque-lsa configure options that were > removed in this release. > See the release announcement at > https://lists.quagga.net/pipermail/quagga-dev/2016-March/014938.html. > Signed-off-by: Baruch Siach Committed, thanks. -- Bye, Peter Korsgaard