quagga-0.98.6-7.1.0.1.AXS3

エラータID: AXSA:2012-930:01

Release date: 
Wednesday, September 26, 2012 - 12:14
Subject: 
quagga-0.98.6-7.1.0.1.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

Quagga is a free software that manages TCP/IP based routing protocol. It takes multi-server and multi-thread approach to resolve the current complexity of the Internet.

Quagga supports BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng.

Quagga is intended to be used as a Route Server and a Route Reflector. It is not a toolkit, it provides full routing power under a new architecture. Quagga by design has a process for each protocol.

Quagga is a fork of GNU Zebra.

Security issues fixed with this release:

• CVE-2010-1674
The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.

• CVE-2011-3323
The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.

• CVE-2011-3324
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.

• CVE-2011-3325
ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.

• CVE-2011-3326
The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.

• CVE-2011-3327
Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.

• CVE-2012-0249
Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.

• CVE-2012-0250
Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. quagga-0.98.6-7.1.0.1.AXS3.src.rpm
    MD5: 90a49e6b88b936b8a2085dba0a4e3ea6
    SHA-256: cbd9a5daeac495dd2073645ece4c89a0f08f832cf83e12e73c96fa5324255cd2
    Size: 1.97 MB

Asianux Server 3 for x86
  1. quagga-0.98.6-7.1.0.1.AXS3.i386.rpm
    MD5: 767356a154d48fc6f6f9e4087500a972
    SHA-256: 70db72706de43522a7c7b836a937ba8e72634869c2dec871774c9a375b78d11c
    Size: 1.10 MB
  2. quagga-contrib-0.98.6-7.1.0.1.AXS3.i386.rpm
    MD5: c6dd4dada789da31b22930585b4286e0
    SHA-256: 992aaecc219a6408b3896180cf9122350961e695fef13ac12277f28afd6b4831
    Size: 15.13 kB
  3. quagga-devel-0.98.6-7.1.0.1.AXS3.i386.rpm
    MD5: 74f6e159e0994277caf3d24afc6df63d
    SHA-256: dc7454b1295d565f104f54d34ab4150635578d90bac759ee4b08708f961f6e31
    Size: 456.93 kB

Asianux Server 3 for x86_64
  1. quagga-0.98.6-7.1.0.1.AXS3.x86_64.rpm
    MD5: 257f406b101d083fa32c901d835fba2b
    SHA-256: 77ddd0c4d3ea4855aa01042278ce945bd03b6731eec85cedae7d2ce9f8ea4365
    Size: 1.13 MB
  2. quagga-contrib-0.98.6-7.1.0.1.AXS3.x86_64.rpm
    MD5: 1d547c89ecb5308b1957c4f37260a0b8
    SHA-256: f744233341a98507794afb4da2a532f89d5e615bc54c25210eb9abda0ac5f556
    Size: 15.09 kB
  3. quagga-devel-0.98.6-7.1.0.1.AXS3.x86_64.rpm
    MD5: d50d0026298a1e5c7f2e57cd3bd2bbea
    SHA-256: 2db625bedf9b58c25da4f144d092a2e4833e382df8e671f13c26835d7b749c63
    Size: 465.27 kB