==========================================================Ubuntu Security Notice USN-1095-1            March 29, 2011
quagga vulnerabilities
CVE-2010-1674, CVE-2010-1675
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  quagga                          0.99.2-1ubuntu3.8

Ubuntu 8.04 LTS:
  quagga                          0.99.9-2ubuntu1.5

Ubuntu 9.10:
  quagga                          0.99.13-1ubuntu0.2

Ubuntu 10.04 LTS:
  quagga                          0.99.15-1ubuntu0.2

Ubuntu 10.10:
  quagga                          0.99.17-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

Details follow:

It was discovered that Quagga incorrectly parsed certain malformed extended
communities. A remote attacker could use this flaw to cause Quagga to
crash, resulting in a denial of service. (CVE-2010-1674)

It was discovered that Quagga resets BGP sessions when encountering
malformed AS_PATHLIMIT attributes. A remote attacker could use this flaw to
disrupt BGP sessions, resulting in a denial of service. This update removes
AS_PATHLIMIT support from Quagga. This issue only affected Ubuntu 8.04 LTS,
9.10, 10.04 LTS and 10.10. (CVE-2010-1675)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

          Size/MD5:    36113 1eb66fc5a3782ce0589f2b282e696be2
          Size/MD5:     1411 87fd7a9171f7c4a4783ad4dc0805f1e1
          Size/MD5:  2185137 88087d90697fcf5fe192352634f340b3

  Architecture independent packages:

          Size/MD5:   664436 d8113a629e9b671fc0bb82464673039d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:  1401410 014fe0299907e363b1ffb42c75c89ee1

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:  1199776 21c7bb4881d3ba04dfc33e862571307f

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:  1351840 38aed9b6353cb4726cede9f8ec9316b0

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:  1322762 acb31557865b45c8f66cec902472f18f

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

          Size/MD5:    39262 3c6096477f97056af0838c3408b04f35
          Size/MD5:     1620 80f65b3b497f46ec444fa32c2162bbc4
          Size/MD5:  2341067 4dbdaf91bf6609803819d97d5fccc4c9

  Architecture independent packages:

          Size/MD5:   662098 1c1e9e6549bb08f0a35b67f0d3912b9d

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:  1620432 1951c3240090d233607c5e89bd1225db

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:  1463056 15eddb43ab310e96ef948547469e72a5

  lpia architecture (Low Power Intel Architecture):

          Size/MD5:  1462096 ed77eba019eb94648d3fa9511f5a66b1

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:  1659220 0b0d9f9d494bd351004c24deba1486e5

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:  1521800 69d72391cb794ea1aff05a3c027d1d0b

Updated packages for Ubuntu 9.10:

  Source archives:

          Size/MD5:    36744 ca2b7bc99044a0cd3a9dca3074092d7e
          Size/MD5:     2062 f56ce9074d4b944d1ac402917751c8d2
          Size/MD5:  2172551 55a7d2dcf016580a7c7412b3518cd942

  Architecture independent packages:

          Size/MD5:   661830 d317a74df29d0d9d2b29d8125901fbdc

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:  1704898 517cf7575403cc3d8dfad3919cc94222

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:  1565536 2b55c6c86db3e7975532beb621cdf2d1

  armel architecture (ARM Architecture):

          Size/MD5:  1494646 8e7bb17883bb8b330631ce1940ca1325

  lpia architecture (Low Power Intel Architecture):

          Size/MD5:  1550538 90aecebc5d3e040b4f39cde032254e4e

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:  1646082 0dbfc717390f284b00b373eb9c8eddc1

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:  1624232 0ad27739f04adebb1041175ba59ac9db

Updated packages for Ubuntu 10.04 LTS:

  Source archives:

          Size/MD5:    38186 c160867f187579266c7e9e2530901c46
          Size/MD5:     2043 2782c599e61e924024bac7c91bf625dc
          Size/MD5:  2191159 8975414c76a295f4855a417af0b5ddce

  Architecture independent packages:

          Size/MD5:   764192 21b1009ec5cfa212cfb67b510de43195

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:  1713668 9437d1d013562e9d5d1f63f13e793076

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:  1570952 c5d82ca896668c53ef9677f0fee9eaa5

  armel architecture (ARM Architecture):

          Size/MD5:  1514696 16e37adb96dc8598618197de47acd024

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:  1653666 6003dce9a240f5fa898c3998d427bb25

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:  1669528 9b6a52df93c0b1df44b96c3d3bf0981b

Updated packages for Ubuntu 10.10:

  Source archives:

          Size/MD5:    36082 0ea8c4782b542282bc7df2802f946901
          Size/MD5:     2052 472f8f02bc416bf043867b062434dba1
          Size/MD5:  2202151 37b9022adca04b03863d2d79787e643f

  Architecture independent packages:

          Size/MD5:   608746 60d0be23780e4b79af1e9eece53ddb89

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:  1693118 512b7d6309cfaee4beb2196bf47c56be

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:  1546418 e6a2d015781c42db6ce07c5a17f0bfea

  armel architecture (ARM Architecture):

          Size/MD5:  1580728 7aa4098e017a8c5e721e91712d13d7b2

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:  1626462 21bd8343d8d5753b08b581b93e158f93



Ubuntu 1095-1: Quagga vulnerabilities

March 29, 2011
It was discovered that Quagga incorrectly parsed certain malformed extended communities

Summary

Update Instructions

References

Severity
quagga vulnerabilities

Package Information

Related News