Bug 527827 - (CVE-2009-3575) CVE-2009-3575 aria2: buffer overflow vulnerability
CVE-2009-3575 aria2: buffer overflow vulnerability
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 527831
  Show dependency treegraph
Reported: 2009-10-07 16:03 EDT by Vincent Danen
Modified: 2010-01-04 11:49 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2010-01-04 11:49:11 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2009-10-07 16:03:20 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-3575 to
the following vulnerability:

Name: CVE-2009-3575
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3575
Assigned: 20091007
Reference: CONFIRM: https://qa.mandriva.com/show_bug.cgi?id=52840
Reference: MANDRIVA:MDVSA-2009:226
Reference: URL: http://www.mandriva.com/security/advisories?name=MDVSA-2009:226
Reference: BID:36332
Reference: URL: http://www.securityfocus.com/bid/36332

Buffer overflow in DHTRoutingTableDeserializer.cc in aria2 0.15.3,
1.2.0, and other versions allows remote attackers to cause a denial of
service (crash) and possibly execute arbitrary code via unknown
Comment 1 Vincent Danen 2009-10-07 16:14:08 EDT
The upstream patch to correct this is here:


This issue affects Fedora 10; Fedora 11 and later is new enough that the offending code has already been fixed upstream.
Comment 3 Fedora Update System 2009-10-07 22:55:39 EDT
aria2-1.3.1-2.fc10 has been submitted as an update for Fedora 10.
Comment 4 Fedora Update System 2009-10-08 23:38:41 EDT
aria2-1.3.1-2.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.