==========================================================================
Ubuntu Security Notice USN-2941-1
March 24, 2016
quagga vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Quagga could be made to crash or run programs if it received specially
crafted network traffic.
Software Description:
– quagga: BGP/OSPF/RIP routing daemon
Details:
Kostya Kortchinsky discovered that Quagga incorrectly handled certain route
data when configured with BGP peers enabled for VPNv4. A remote attacker
could use this issue to cause Quagga to crash, resulting in a denial of
service, or possibly execute arbitrary code. (CVE-2016-2342)
It was discovered that Quagga incorrectly handled messages with a large
LSA when used in certain configurations. A remote attacker could use this
issue to cause Quagga to crash, resulting in a denial of service. This
issue only affected Ubuntu 12.04 LTS. (CVE-2013-2236)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.10:
quagga 0.99.24.1-2ubuntu0.1
Ubuntu 14.04 LTS:
quagga 0.99.22.4-3ubuntu1.1
Ubuntu 12.04 LTS:
quagga 0.99.20.1-0ubuntu0.12.04.4
After a standard system update you need to restart Quagga to make all the
necessary changes.
References:
http://www.ubuntu.com/usn/usn-2941-1
CVE-2013-2236, CVE-2016-2342
Package Information:
https://launchpad.net/ubuntu/+source/quagga/0.99.24.1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/quagga/0.99.22.4-3ubuntu1.1
https://launchpad.net/ubuntu/+source/quagga/0.99.20.1-0ubuntu0.12.04.4
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=VZ+X
—–END PGP SIGNATURE—–
—