==========================================================================
Ubuntu Security Notice USN-6432-1
October 17, 2023

quagga vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)

Summary:

Several security issues were fixed in Quagga.

Software Description:
- quagga: BGP/OSPF/RIP routing daemon

Details:

It was discovered that the Quagga BGP daemon did not properly check the
attribute length in NRLI. A remote attacker could possibly use this issue
to cause a denial of service. (CVE-2023-41358)

It was discovered that the Quagga BGP daemon did not properly manage memory
when reading initial bytes of ORF header. A remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-41360)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  quagga                          1.2.4-4ubuntu0.1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
  quagga                          1.2.4-1ubuntu0.1~esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
  quagga                          0.99.24.1-2ubuntu1.4+esm1

After a standard system update you need to restart Quagga to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-6432-1
  CVE-2023-41358, CVE-2023-41360

Package Information:
  https://launchpad.net/ubuntu/+source/quagga/1.2.4-4ubuntu0.1

Ubuntu 6432-1: Quagga vulnerabilities

October 17, 2023
Several security issues were fixed in Quagga.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in Quagga. Software Description: - quagga: BGP/OSPF/RIP routing daemon Details: It was discovered that the Quagga BGP daemon did not properly check the attribute length in NRLI. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-41358) It was discovered that the Quagga BGP daemon did not properly manage memory when reading initial bytes of ORF header. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-41360)

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: quagga 1.2.4-4ubuntu0.1 Ubuntu 18.04 LTS (Available with Ubuntu Pro): quagga 1.2.4-1ubuntu0.1~esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): quagga 0.99.24.1-2ubuntu1.4+esm1 After a standard system update you need to restart Quagga to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-6432-1

CVE-2023-41358, CVE-2023-41360

Severity
Ubuntu Security Notice USN-6432-1

Package Information

https://launchpad.net/ubuntu/+source/quagga/1.2.4-4ubuntu0.1

Related News