Headline
Ubuntu Security Notice USN-6432-1
Ubuntu Security Notice 6432-1 - It was discovered that the Quagga BGP daemon did not properly check the attribute length in NRLI. A remote attacker could possibly use this issue to cause a denial of service. It was discovered that the Quagga BGP daemon did not properly manage memory when reading initial bytes of ORF header. A remote attacker could possibly use this issue to cause a denial of service.
==========================================================================
Ubuntu Security Notice USN-6432-1
October 17, 2023
quagga vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in Quagga.
Software Description:
- quagga: BGP/OSPF/RIP routing daemon
Details:
It was discovered that the Quagga BGP daemon did not properly check the
attribute length in NRLI. A remote attacker could possibly use this issue
to cause a denial of service. (CVE-2023-41358)
It was discovered that the Quagga BGP daemon did not properly manage memory
when reading initial bytes of ORF header. A remote attacker could possibly
use this issue to cause a denial of service. (CVE-2023-41360)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
quagga 1.2.4-4ubuntu0.1
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
quagga 1.2.4-1ubuntu0.1~esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
quagga 0.99.24.1-2ubuntu1.4+esm1
After a standard system update you need to restart Quagga to make
all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6432-1
CVE-2023-41358, CVE-2023-41360
Package Information:
https://launchpad.net/ubuntu/+source/quagga/1.2.4-4ubuntu0.1
Related news
Debian Linux Security Advisory 5495-1 - Multiple vulnerabilities were discovered in frr, the FRRouting suite of internet protocols, while processing malformed requests and packets the BGP daemon may have reachable assertions, NULL pointer dereference, out-of-bounds memory access, which may lead to denial of service attack.
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.