drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in quagga
Name: |
Zwei Probleme in quagga |
|
ID: |
USN-2941-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10 |
|
Datum: |
Do, 24. März 2016, 14:27 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236 |
|
Applikationen: |
quagga |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3369615926638065437== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="LqCFltHhLAQrgR91ALHa8FAGwXMxJuF4A"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --LqCFltHhLAQrgR91ALHa8FAGwXMxJuF4A Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2941-1 March 24, 2016
quagga vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Quagga could be made to crash or run programs if it received specially crafted network traffic.
Software Description: - quagga: BGP/OSPF/RIP routing daemon
Details:
Kostya Kortchinsky discovered that Quagga incorrectly handled certain route data when configured with BGP peers enabled for VPNv4. A remote attacker could use this issue to cause Quagga to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-2342)
It was discovered that Quagga incorrectly handled messages with a large LSA when used in certain configurations. A remote attacker could use this issue to cause Quagga to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS. (CVE-2013-2236)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: quagga 0.99.24.1-2ubuntu0.1
Ubuntu 14.04 LTS: quagga 0.99.22.4-3ubuntu1.1
Ubuntu 12.04 LTS: quagga 0.99.20.1-0ubuntu0.12.04.4
After a standard system update you need to restart Quagga to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2941-1 CVE-2013-2236, CVE-2016-2342
Package Information: https://launchpad.net/ubuntu/+source/quagga/0.99.24.1-2ubuntu0.1 https://launchpad.net/ubuntu/+source/quagga/0.99.22.4-3ubuntu1.1 https://launchpad.net/ubuntu/+source/quagga/0.99.20.1-0ubuntu0.12.04.4
--LqCFltHhLAQrgR91ALHa8FAGwXMxJuF4A Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJW8+fkAAoJEGVp2FWnRL6TuaAP/jaNNhbIo5Wp5Kw4kKOn5C/f Usq84cCETZTd4OSk6OijMcGl/Exj5F6gYQrjCXlohUXMVciFFa/u4lia4S3nKijE zDlaSSQWD+AcfB64VQx2/u0efK6eCiMeHNiNfT6lZNSO4b49zGmyrU8uyJTtMQ1J VHKYvmPF9XSGgWt/RX0IqSHvARVEu0VWY4z+u//XPsi/M4Ho1jv3M0mG1LOCni2x iI7gYm2VTpJlczXKJO8PEvpJ644vM3vq5h/GGEXw7zwZ+uzMK5dCUgBcglKOOMis D3U0BPnT5Hx0bNsCp0LUFN6BUOrJrxquZTAx71JMiEDbMXixwQCWG5eFkaOTzw4E 4lVw4fhtr4W47UgCYDi6DxFQ57jX6UAoef8zDM7E7ZnJluun2IOXr+RJPAUhsHYt rT3NPopUwbTFpezBvHRydUKUP5xU6aCet3fAFtcU67uoxT9VqvjgapcpIsHOD4Mo PtMrw3EPdWK5FFUTgWmncRRQdZlg/ugzoI484CZlsFA9QbTe4wB0Ct/YRMdaapOJ AvZHHBSZbhNyqqbWL5Uc/NETqx8sqxiKaDzgzdzwXbkscek2ilboGQUjIwvBTc/r zXb+1uhvjPJOh2b5Ir6o+6R2+pit8NuSihqyoZ/4kA3q8TyacVsyLXXrDFSSPQjh Hg3HzKD7WlYpNsuVA8n6 =VZ+X -----END PGP SIGNATURE-----
--LqCFltHhLAQrgR91ALHa8FAGwXMxJuF4A--
--===============3369615926638065437== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============3369615926638065437==--
|
|
|
|