USN-3471-1: Quagga vulnerabilities

Publication date

31 October 2017

Overview

Several security issues were fixed in Quagga.


Packages

  • quagga - BGP/OSPF/RIP routing daemon

Details

Andreas Jaggi discovered that Quagga incorrectly handled certain BGP UPDATE
messages. A remote attacker could possibly use this issue to cause Quagga
to crash, resulting in a denial of service. (CVE-2017-16227)

Quentin Young discovered that Quagga incorrectly handled memory in the
telnet vty CLI. An attacker able to connect to the telnet interface could
possibly use this issue to cause Quagga to consume memory, resulting in a
denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu
16.04 LTS. (CVE-2017-5495)

Andreas Jaggi discovered that Quagga incorrectly handled certain BGP UPDATE
messages. A remote attacker could possibly use this issue to cause Quagga
to crash, resulting in a denial of service. (CVE-2017-16227)

Quentin Young discovered that Quagga incorrectly handled memory in the
telnet vty CLI. An attacker able to connect to the telnet interface could
possibly use this issue to cause Quagga to consume memory, resulting in a
denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu
16.04 LTS. (CVE-2017-5495)

Update instructions

After a standard system update you need to restart Quagga to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
17.10 artful quagga –  1.1.1-3ubuntu0.1
quagga-bgpd –  1.1.1-3ubuntu0.1
17.04 zesty quagga –  1.1.1-1ubuntu0.1
quagga-bgpd –  1.1.1-1ubuntu0.1
16.04 xenial quagga –  0.99.24.1-2ubuntu1.3
14.04 trusty quagga –  0.99.22.4-3ubuntu1.4

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›