MGASA-2016-0165

Source
https://advisories.mageia.org/MGASA-2016-0165.html
Import Source
https://advisories.mageia.org/MGASA-2016-0165.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0165
Upstream
Published
2016-05-05T16:26:44Z
Modified
2026-04-16T06:25:18.099831836Z
Summary
Updated quagga packages fix CVE-2016-4049
Details

Updated quagga packages fix security vulnerability:

A denial of dervice vulnerability have been found in BGP daemon from Quagga routing software (bgpd): if the following conditions are satisfied:

  • regular dumping is enabled
  • bgpd instance has many BGP peers

then BGP message packets that are big enough cause bgpd to crash. The situation when the conditions above are satisfied is quite common. Moreover, it is easy to craft a packet which is much "bigger" than a typical packet, and hence such crafted packet can much more likely cause the crash (CVE-2016-4049).

References
Credits

Affected packages

Mageia:5 / quagga

Package

Name
quagga
Purl
pkg:rpm/mageia/quagga?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.99.22.4-4.2.mga5

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2016-0165.json"