Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in quagga
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in quagga
ID: USN-3573-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 17.10
Datum: Fr, 16. Februar 2018, 07:03
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5378
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5381
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5380
Applikationen: quagga

Originalnachricht


--===============2439238934519397321==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="9jxsPFA5p3P2qPhR"
Content-Disposition: inline


--9jxsPFA5p3P2qPhR
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3573-1
February 16, 2018

quagga vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Quagga.

Software Description:
- quagga: BGP/OSPF/RIP routing daemon

Details:

It was discovered that a double-free vulnerability existed in the
Quagga BGP daemon when processing certain forms of UPDATE message.
A remote attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2018-5379)

It was discovered that the Quagga BGP daemon did not properly bounds
check the data sent with a NOTIFY to a peer. An attacker could use this
to expose sensitive information or possibly cause a denial of service.
This issue only affected Ubuntu 17.10. (CVE-2018-5378)

It was discovered that a table overrun vulnerability existed in the
Quagga BGP daemon. An attacker in control of a configured peer could
use this to possibly expose sensitive information or possibly cause
a denial of service. (CVE-2018-5380)

It was discovered that the Quagga BGP daemon in some configurations
did not properly handle invalid OPEN messages. An attacker in control
of a configured peer could use this to cause a denial of service
(infinite loop). (CVE-2018-5381)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
quagga 1.1.1-3ubuntu0.2
quagga-bgpd 1.1.1-3ubuntu0.2

Ubuntu 16.04 LTS:
quagga 0.99.24.1-2ubuntu1.4

Ubuntu 14.04 LTS:
quagga 0.99.22.4-3ubuntu1.5

After a standard system update you need to restart Quagga to make
all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3573-1
CVE-2018-5378, CVE-2018-5379, CVE-2018-5380, CVE-2018-5381

Package Information:
https://launchpad.net/ubuntu/+source/quagga/1.1.1-3ubuntu0.2
https://launchpad.net/ubuntu/+source/quagga/0.99.24.1-2ubuntu1.4
https://launchpad.net/ubuntu/+source/quagga/0.99.22.4-3ubuntu1.5


--9jxsPFA5p3P2qPhR
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=sgSF
-----END PGP SIGNATURE-----

--9jxsPFA5p3P2qPhR--


--===============2439238934519397321==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung