The bgpdumproutesfunc function in bgpd/bgpdump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.
{ "binaries": [ { "binary_version": "0.99.22.4-3ubuntu1.2", "binary_name": "quagga" } ], "availability": "No subscription required" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4049.json"
{ "binaries": [ { "binary_version": "0.99.24.1-2ubuntu1.1", "binary_name": "quagga" } ], "availability": "No subscription required" }