Source: bird Version: 1.6.3-2 Severity: critical Tags: security According to the upstream website[1] and changelog[2], bird release 1.6.4 includes an "important security bugfix".
The changelog mentions "Filter: Fixed stack overflow in BGP mask expressions". A quick scan through the git history revealed a few commits that mention overflow and use after free fixes: e8bc64e308586b6502090da2775af84cd760ed0d Filter: make bgpmask literals real constructors 30c734fc73648e4c43af4f45e68ac2de3d7ddea1 Static: Fix bug in static route filter expressions Probably the best is to ask upstream about security relevant commits and consider to either backport them to stretch-backports. Another option would be to upload 1.6.4 to stretch-security as 1.6.4-0+deb9u1. Cheers jonas [1] http://bird.network.cz/ [2] https://gitlab.labs.nic.cz/labs/bird/blob/v1.6.4/NEWS#L11 -- System Information: Debian Release: 9.4 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.9.0-6-amd64 (SMP w/4 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system)