U radu programskog paketa quagga uočeno je više sigurnosnih propusta koje zlonamjerni napadači mogu iskoristiti za izvođenje DoS napada i pokretanje zlonamjernog koda.
Paket:
quagga 0.x
Operacijski sustavi:
Fedora 15, Fedora 16
Kritičnost:
6.5
Problem:
pogreška u programskoj komponenti, preljev međuspremnika
Propusti su povezani s greškama u programskim funkcijama "ospf6_lsa_is_changed" i "ospf_flood", programskoj komponenti "ospf_packet.c", implementacijama protokola OSPFv3 i BGP te preljevom međuspremnika koji se javlja u programskim funkcijama "ecommunity_ecom2str" i "ospf_ls_upd_list_lsa" te u implementaciji protokola OSPFv2.
Posljedica:
Udaljeni napadač je mogao iskoristiti navedene nedostatke za izvođenje napada uskraćivanja usluga i pokretanje zlonamjernog koda.
Rješenje:
Kao rješenje problema, svim korisnicima se savjetuje ugradnja izdane zakrpe.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-5436
2012-04-06 20:57:31
--------------------------------------------------------------------------------
Name : quagga
Product : Fedora 15
Version : 0.99.20.1
Release : 1.fc15
URL : http://www.quagga.net
Summary : Routing daemon
Description :
Quagga is a free software that manages TCP/IP based routing
protocol. It takes multi-server and multi-thread approach to resolve
the current complexity of the Internet.
Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.
Quagga is intended to be used as a Route Server and a Route Reflector. It is
not a toolkit, it provides full routing power under a new architecture.
Quagga by design has a process for each protocol.
Quagga is a fork of GNU Zebra.
--------------------------------------------------------------------------------
Update Information:
fixes CVEs, updates to latest upstream quagga-0.99.20.1
--------------------------------------------------------------------------------
ChangeLog:
* Thu Mar 15 2012 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.20.1-1
- updated to latest upstream version 0.99.20.1
* Tue Oct 18 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.20-2
- fixes #746886 - severe memory leak in quagga 0.99.{19,20}
* Fri Sep 30 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.20-1
- updated to latest upstream version 0.99.20
- fixes #741343 - CVE-2011-3325 corrected fix
* Thu Sep 29 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.19-1
- fixes #741343 - CVE-2011-3323 CVE-2011-3324 CVE-2011-3325 CVE-2011-3326
CVE-2011-3327
- fixes #741580 - updated to latest upstream version 0.99.19
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #802827 - CVE-2012-0249 quagga (ospfd): Assertion failure due
improper length check for a received LS-Update OSPF packet
https://bugzilla.redhat.com/show_bug.cgi?id=802827
[ 2 ] Bug #802829 - CVE-2012-0250 quagga (ospfd): Crash by processing
LS-Update OSPF packet due improper length check of the Network-LSA structures
https://bugzilla.redhat.com/show_bug.cgi?id=802829
[ 3 ] Bug #802781 - CVE-2012-0255 quagga (bgpd): Assertion failure by
processing malformed AS4 capability in BGP OPEN message
https://bugzilla.redhat.com/show_bug.cgi?id=802781
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update quagga' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-5411
2012-04-06 20:56:26
--------------------------------------------------------------------------------
Name : quagga
Product : Fedora 16
Version : 0.99.20.1
Release : 1.fc16
URL : http://www.quagga.net
Summary : Routing daemon
Description :
Quagga is a free software that manages TCP/IP based routing
protocol. It takes multi-server and multi-thread approach to resolve
the current complexity of the Internet.
Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.
Quagga is intended to be used as a Route Server and a Route Reflector. It is
not a toolkit, it provides full routing power under a new architecture.
Quagga by design has a process for each protocol.
Quagga is a fork of GNU Zebra.
--------------------------------------------------------------------------------
Update Information:
fixes CVEs, updates to latest upstream quagga-0.99.20.1
--------------------------------------------------------------------------------
ChangeLog:
* Thu Mar 15 2012 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.20.1-1
- updated to latest upstream version 0.99.20.1
* Wed Nov 23 2011 Jiri Skala <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 0.99.20-4
- modified permissions of var dirs (fixes #755491)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #802827 - CVE-2012-0249 quagga (ospfd): Assertion failure due
improper length check for a received LS-Update OSPF packet
https://bugzilla.redhat.com/show_bug.cgi?id=802827
[ 2 ] Bug #802829 - CVE-2012-0250 quagga (ospfd): Crash by processing
LS-Update OSPF packet due improper length check of the Network-LSA structures
https://bugzilla.redhat.com/show_bug.cgi?id=802829
[ 3 ] Bug #802781 - CVE-2012-0255 quagga (bgpd): Assertion failure by
processing malformed AS4 capability in BGP OPEN message
https://bugzilla.redhat.com/show_bug.cgi?id=802781
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update quagga' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke