Subject: | |
From: | |
Reply To: | |
Date: | Thu, 21 Oct 2010 11:33:51 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: quagga security update
Issue date: 2010-10-20
CVE Names: CVE-2007-4826 CVE-2010-2948
A stack-based buffer overflow flaw was found in the way the Quagga bgpd
daemon processed certain BGP Route Refresh (RR) messages. A configured
BGP peer could send a specially-crafted BGP message, causing bgpd on a
target system to crash or, possibly, execute arbitrary code with the
privileges of the user running bgpd. (CVE-2010-2948)
Note: On Scientific Linux 5 it is not possible to exploit
CVE-2010-2948 to run arbitrary code as the overflow is blocked by
FORTIFY_SOURCE.
Multiple NULL pointer dereference flaws were found in the way the Quagga
bgpd daemon processed certain specially-crafted BGP messages. A
configured BGP peer could crash bgpd on a target system via
specially-crafted BGP messages. (CVE-2007-4826)
After installing the updated packages, the bgpd daemon must be restarted
for the update to take effect.
SL 4.x
SRPMS:
quagga-0.98.3-4.el4_8.1.src.rpm
i386:
quagga-0.98.3-4.el4_8.1.i386.rpm
quagga-contrib-0.98.3-4.el4_8.1.i386.rpm
quagga-devel-0.98.3-4.el4_8.1.i386.rpm
x86_64:
quagga-0.98.3-4.el4_8.1.x86_64.rpm
quagga-contrib-0.98.3-4.el4_8.1.x86_64.rpm
quagga-devel-0.98.3-4.el4_8.1.x86_64.rpm
SL 5.x
SRPMS:
quagga-0.98.6-5.el5_5.2.src.rpm
i386:
quagga-0.98.6-5.el5_5.2.i386.rpm
quagga-contrib-0.98.6-5.el5_5.2.i386.rpm
quagga-devel-0.98.6-5.el5_5.2.i386.rpm
x86_64:
quagga-0.98.6-5.el5_5.2.x86_64.rpm
quagga-contrib-0.98.6-5.el5_5.2.x86_64.rpm
quagga-devel-0.98.6-5.el5_5.2.i386.rpm
quagga-devel-0.98.6-5.el5_5.2.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|