Ubuntu 775-2: Quagga regression

    Date09 Jun 2009
    CategoryUbuntu
    82
    Posted ByLinuxSecurity Advisories
    USN-775-1 fixed vulnerabilities in Quagga. The preventative fixesintroduced in Quagga prior to Ubuntu 9.04 could result in BGP servicefailures. This update fixes the problem.
    ===========================================================
    Ubuntu Security Notice USN-775-2              June 09, 2009
    quagga regression
    https://launchpad.net/bugs/384193
    ===========================================================
    
    A security issue affects the following Ubuntu releases:
    
    Ubuntu 6.06 LTS
    Ubuntu 8.04 LTS
    Ubuntu 8.10
    
    This advisory also applies to the corresponding versions of
    Kubuntu, Edubuntu, and Xubuntu.
    
    The problem can be corrected by upgrading your system to the
    following package versions:
    
    Ubuntu 6.06 LTS:
      quagga                          0.99.2-1ubuntu3.6
    
    Ubuntu 8.04 LTS:
      quagga                          0.99.9-2ubuntu1.3
    
    Ubuntu 8.10:
      quagga                          0.99.9-6ubuntu0.2
    
    In general, a standard system upgrade is sufficient to effect the
    necessary changes.
    
    Details follow:
    
    USN-775-1 fixed vulnerabilities in Quagga.  The preventative fixes
    introduced in Quagga prior to Ubuntu 9.04 could result in BGP service
    failures.  This update fixes the problem.
    
    We apologize for the inconvenience.
    
    Original advisory details:
    
     It was discovered that the BGP service in Quagga did not correctly
     handle certain AS paths containing 4-byte ASNs.  An authenticated remote
     attacker could exploit this flaw to cause bgpd to abort, leading to a
     denial of service.
    
    
    Updated packages for Ubuntu 6.06 LTS:
    
      Source archives:
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.6.diff.gz
          Size/MD5:    33723 68d422d6bc1144c884c8d3464b2d7132
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.6.dsc
          Size/MD5:      808 f99f295766118d53be45a1186c2c0a98
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2.orig.tar.gz
          Size/MD5:  2185137 88087d90697fcf5fe192352634f340b3
    
      Architecture independent packages:
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.2-1ubuntu3.6_all.deb
          Size/MD5:   664150 cdb4f6e8bd79bd87efb0e0c083ea5102
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.6_amd64.deb
          Size/MD5:  1404194 f771faa047cb099f9c2413e9f06a9228
    
      i386 architecture (x86 compatible Intel/AMD):
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.6_i386.deb
          Size/MD5:  1199178 8c288bcee96507962ffb0b95e26cc77c
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.6_powerpc.deb
          Size/MD5:  1351356 8803c7a2df4bdc196a8746199badd6c7
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.2-1ubuntu3.6_sparc.deb
          Size/MD5:  1322370 0412d82e928f89a739287456b43f355a
    
    Updated packages for Ubuntu 8.04 LTS:
    
      Source archives:
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.3.diff.gz
          Size/MD5:    35961 52f3b6d3d31515936f582dea2ff81322
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.3.dsc
          Size/MD5:     1022 d4a0caac214e93c40cb73c5066dca423
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9.orig.tar.gz
          Size/MD5:  2341067 4dbdaf91bf6609803819d97d5fccc4c9
    
      Architecture independent packages:
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.9-2ubuntu1.3_all.deb
          Size/MD5:   661722 a301f125c189a5147022712c7beb043d
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.3_amd64.deb
          Size/MD5:  1619806 e455a7297029d4041f67e88ba20e3c04
    
      i386 architecture (x86 compatible Intel/AMD):
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.3_i386.deb
          Size/MD5:  1464714 0dbc4715b946e5acf8ce082cc7e4d84c
    
      lpia architecture (Low Power Intel Architecture):
    
        http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.3_lpia.deb
          Size/MD5:  1461224 de1ec96b620619222ddb8f14a62a2b2c
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.3_powerpc.deb
          Size/MD5:  1658750 10e87db24545fd262e9ab09c454dbcb3
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.9-2ubuntu1.3_sparc.deb
          Size/MD5:  1521338 da17c3904269a1c02f44c885ea11910e
    
    Updated packages for Ubuntu 8.10:
    
      Source archives:
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-6ubuntu0.2.diff.gz
          Size/MD5:    35942 c398f6251074d10961f61146438ca43b
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-6ubuntu0.2.dsc
          Size/MD5:     1486 69e9c33ac728149c88a14e9ec3aa3d19
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9.orig.tar.gz
          Size/MD5:  2341067 4dbdaf91bf6609803819d97d5fccc4c9
    
      Architecture independent packages:
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga-doc_0.99.9-6ubuntu0.2_all.deb
          Size/MD5:   661184 fbe795b23f63d7b3829af6e380851898
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-6ubuntu0.2_amd64.deb
          Size/MD5:  1729234 ece98a59fe978b3fa745f243f474203b
    
      i386 architecture (x86 compatible Intel/AMD):
    
        http://security.ubuntu.com/ubuntu/pool/main/q/quagga/quagga_0.99.9-6ubuntu0.2_i386.deb
          Size/MD5:  1589744 7b785351949cc9fae156ecaa9de01a16
    
      lpia architecture (Low Power Intel Architecture):
    
        http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.9-6ubuntu0.2_lpia.deb
          Size/MD5:  1565198 17ae197e27cfa117aa8138d51966021d
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.9-6ubuntu0.2_powerpc.deb
          Size/MD5:  1693920 71d67e45e19c379b5ab7068428425c87
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        http://ports.ubuntu.com/pool/main/q/quagga/quagga_0.99.9-6ubuntu0.2_sparc.deb
          Size/MD5:  1643486 439ea98447af83e3f8be1b1fb7420190
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.