Login


 
Newsletter
Werbung

Sicherheit: Zwei Probleme in quagga
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in quagga
ID: USN-2941-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10
Datum: Do, 24. März 2016, 14:27
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3369615926638065437==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="LqCFltHhLAQrgR91ALHa8FAGwXMxJuF4A"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--LqCFltHhLAQrgR91ALHa8FAGwXMxJuF4A
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2941-1
March 24, 2016

quagga vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Quagga could be made to crash or run programs if it received specially
crafted network traffic.

Software Description:
- quagga: BGP/OSPF/RIP routing daemon

Details:

Kostya Kortchinsky discovered that Quagga incorrectly handled certain route
data when configured with BGP peers enabled for VPNv4. A remote attacker
could use this issue to cause Quagga to crash, resulting in a denial of
service, or possibly execute arbitrary code. (CVE-2016-2342)

It was discovered that Quagga incorrectly handled messages with a large
LSA when used in certain configurations. A remote attacker could use this
issue to cause Quagga to crash, resulting in a denial of service. This
issue only affected Ubuntu 12.04 LTS. (CVE-2013-2236)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
quagga 0.99.24.1-2ubuntu0.1

Ubuntu 14.04 LTS:
quagga 0.99.22.4-3ubuntu1.1

Ubuntu 12.04 LTS:
quagga 0.99.20.1-0ubuntu0.12.04.4

After a standard system update you need to restart Quagga to make all the
necessary changes.

References:
http://www.ubuntu.com/usn/usn-2941-1
CVE-2013-2236, CVE-2016-2342

Package Information:
https://launchpad.net/ubuntu/+source/quagga/0.99.24.1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/quagga/0.99.22.4-3ubuntu1.1
https://launchpad.net/ubuntu/+source/quagga/0.99.20.1-0ubuntu0.12.04.4



--LqCFltHhLAQrgR91ALHa8FAGwXMxJuF4A
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=VZ+X
-----END PGP SIGNATURE-----

--LqCFltHhLAQrgR91ALHa8FAGwXMxJuF4A--


--===============3369615926638065437==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============3369615926638065437==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung