{"id":20124,"date":"2017-11-01T04:34:26","date_gmt":"2017-10-31T19:34:26","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3471-1-quagga-vulnerabilities\/"},"modified":"2017-11-01T04:34:26","modified_gmt":"2017-10-31T19:34:26","slug":"usn-3471-1-quagga-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3471-1-quagga-vulnerabilities\/","title":{"rendered":"USN-3471-1: Quagga vulnerabilities"},"content":{"rendered":"<p>USN-3471-1: Quagga vulnerabilities<\/p>\n<h2>Ubuntu Security Notice USN-3471-1<\/h2>\n<p><em>31st October, 2017<\/em><\/p>\n<h3>quagga vulnerabilities<\/h3>\n<p>A security issue affects these releases of Ubuntu and its<br \/>\n    derivatives:<\/p>\n<ul>\n<li>Ubuntu 17.10<\/li>\n<li>Ubuntu 17.04<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<\/ul>\n<h3>Summary<\/h3>\n<p>Several security issues were fixed in Quagga.\n<\/p>\n<h3>Software description<\/h3>\n<ul>\n<li>quagga<br \/>\n    &#8211; BGP\/OSPF\/RIP routing daemon<\/p>\n<\/li>\n<\/ul>\n<h3>Details<\/h3>\n<p>Andreas Jaggi discovered that Quagga incorrectly handled certain BGP UPDATE<br \/>messages. A remote attacker could possibly use this issue to cause Quagga<br \/>to crash, resulting in a denial of service. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-16227\">CVE-2017-16227<\/a>)<\/p>\n<p>Quentin Young discovered that Quagga incorrectly handled memory in the<br \/>telnet vty CLI. An attacker able to connect to the telnet interface could<br \/>possibly use this issue to cause Quagga to consume memory, resulting in a<br \/>denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu<br \/>16.04 LTS. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5495\">CVE-2017-5495<\/a>)<\/p>\n<h3>Update instructions<\/h3>\n<p> The problem can be corrected by updating your system to the following<br \/>\npackage version:<\/p>\n<dl>\n<dt>Ubuntu 17.10:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\">quagga<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\/1.1.1-3ubuntu0.1\">1.1.1-3ubuntu0.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\">quagga-bgpd<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\/1.1.1-3ubuntu0.1\">1.1.1-3ubuntu0.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 17.04:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\">quagga<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\/1.1.1-1ubuntu0.1\">1.1.1-1ubuntu0.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\">quagga-bgpd<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\/1.1.1-1ubuntu0.1\">1.1.1-1ubuntu0.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 16.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\">quagga<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\/0.99.24.1-2ubuntu1.3\">0.99.24.1-2ubuntu1.3<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 14.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\">quagga<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/quagga\/0.99.22.4-3ubuntu1.4\">0.99.22.4-3ubuntu1.4<\/a><br \/>\n    <\/span>\n  <\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions:<br \/>\n<a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.\n<\/p>\n<p>After a standard system update you need to restart Quagga to make all the<br \/>necessary changes.<\/p>\n<h3>References<\/h3>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-16227\">CVE-2017-16227<\/a>, <\/p>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5495\">CVE-2017-5495<\/a><\/p>\n<p>Source: <a href=\"http:\/\/www.ubuntu.com\/usn\/usn-3471-1\/\" target=\"_blank\">USN-3471-1: Quagga vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3471-1: Quagga vulnerabilities Ubuntu Security Notice USN-3471-1 31st October, 2017 quagga vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 17.10 Ubuntu 17.04 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary Several security issues were fixed in Quagga. Software description quagga &#8211; BGP\/OSPF\/RIP routing daemon Details Andreas Jaggi discovered that Quagga incorrectly handled certain BGP UPDATEmessages. A remote attacker could possibly use this issue to cause Quaggato crash, resulting in a denial of service. (CVE-2017-16227) Quentin Young discovered that Quagga incorrectly handled memory in thetelnet vty CLI. An attacker able to connect to the telnet interface couldpossibly use this issue to cause Quagga to consume memory, resulting in adenial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu16.04 LTS. (CVE-2017-5495) Update instructions The problem can be corrected by updating your system to the following package <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3471-1-quagga-vulnerabilities\/\" title=\"USN-3471-1: Quagga vulnerabilities\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-20124","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/20124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=20124"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/20124\/revisions"}],"predecessor-version":[{"id":20125,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/20124\/revisions\/20125"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=20124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=20124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=20124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}