Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 227913 - net-misc/quagga 0.99.10 version bump - security fixes
Summary: net-misc/quagga 0.99.10 version bump - security fixes
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High enhancement
Assignee: Gentoo Security
URL: http://www.quagga.net/news2.php?y=200...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2008-06-17 18:26 UTC by sargun dhillon
Modified: 2010-03-06 16:43 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
The patches for the ebuild (quagga-0.99.10-patches-20080617.tar.gz,13.89 KB, text/plain)
2008-06-17 18:27 UTC, sargun dhillon
no flags Details
The ebuild for quagga 0.99.10 (quagga-0.99.10.ebuild,3.49 KB, text/plain)
2008-06-17 18:28 UTC, sargun dhillon
no flags Details
A security fix for the bgpd init script, binding to 0.0.0.0 causes security issues (bgpd.init,952 bytes, text/plain)
2008-06-17 18:44 UTC, sargun dhillon
no flags Details
A security fix for the init script, binding to 0.0.0.0 causes security issues (ospf6d.init,970 bytes, text/plain)
2008-06-17 19:53 UTC, sargun dhillon
no flags Details
A security fix for the init script, binding to 0.0.0.0 causes security issues (ospfd.init,962 bytes, text/plain)
2008-06-17 19:53 UTC, sargun dhillon
no flags Details
A security fix for the init script, binding to 0.0.0.0 causes security issues (ripd.init,952 bytes, text/plain)
2008-06-17 19:54 UTC, sargun dhillon
no flags Details
A security fix for the init script, binding to 0.0.0.0 causes security issues (ripngd.init,972 bytes, text/plain)
2008-06-17 19:54 UTC, sargun dhillon
no flags Details
A security fix for the init script, binding to 0.0.0.0 causes security issues (zebra.init,1.04 KB, text/plain)
2008-06-17 19:55 UTC, sargun dhillon
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description sargun dhillon 2008-06-17 18:26:05 UTC
These are the files associated with the new ebuild for Quagga (0.99.10). There was regression though, the MD5 support for BGP has not been updated yet. 

Reproducible: Always
Comment 1 sargun dhillon 2008-06-17 18:27:03 UTC
Created attachment 157329 [details]
The patches for the ebuild
Comment 2 sargun dhillon 2008-06-17 18:28:47 UTC
Created attachment 157331 [details]
The ebuild for quagga 0.99.10
Comment 3 sargun dhillon 2008-06-17 18:44:42 UTC
Created attachment 157335 [details]
A security fix for the bgpd init script, binding to 0.0.0.0 causes security issues
Comment 4 sargun dhillon 2008-06-17 19:53:29 UTC
Created attachment 157345 [details]
A security fix for the init script, binding to 0.0.0.0 causes security issues
Comment 5 sargun dhillon 2008-06-17 19:53:54 UTC
Created attachment 157347 [details]
A security fix for the init script, binding to 0.0.0.0 causes security issues
Comment 6 sargun dhillon 2008-06-17 19:54:17 UTC
Created attachment 157349 [details]
A security fix for the init script, binding to 0.0.0.0 causes security issues
Comment 7 sargun dhillon 2008-06-17 19:54:46 UTC
Created attachment 157351 [details]
A security fix for the init script, binding to 0.0.0.0 causes security issues
Comment 8 sargun dhillon 2008-06-17 19:55:43 UTC
Created attachment 157353 [details]
A security fix for the init script, binding to 0.0.0.0 causes security issues
Comment 9 Robert Buchholz (RETIRED) gentoo-dev 2008-06-18 13:09:49 UTC
The issue fixed in the new upstream release is a DoS vulnerability in bgpd.

Sargun, can you elaborate on the 0.0.0.0 binding change in the init script?
Comment 10 sargun dhillon 2008-06-18 14:06:33 UTC
Currently the VTY binds to 0.0.0.0 (global, the world, etc). The VTY is the quagga management interface and it isn't meant for high load. Hypothetically someone could DoS this telnet based interface. Alternatively if someone took an out of the box Zebra and started it up with a weak password, it is immediately open to the world. Normally users will use a weak password because they assume that they are the only ones with access to the box.

Its really "Secure out of the box" > "Ease out of the box"

Also, the init scripts to not require the new ebuild, they are drop-in replacements.
Comment 11 Alin Năstac (RETIRED) gentoo-dev 2008-06-18 16:40:25 UTC
By default, vty terminal is available only to root user of the box:
  apollo ~ # telnet hades bgpd
  Trying 217.156.27.2...
  Connected to hades.ineton.ro.
  Escape character is '^]'.
  Vty password is not set.
  Connection closed by foreign host.
I really don't see how this could qualify as security vulnerability.

I will deal with version bump as soon as I can.
Comment 12 Alin Năstac (RETIRED) gentoo-dev 2008-06-18 20:07:43 UTC
Version has been bumped, with all USE flags as the previous version.
No need to stabilize it since 0.99 is the development branch.
Comment 13 Pierre-Yves Rofes (RETIRED) gentoo-dev 2008-06-19 10:58:03 UTC
(In reply to comment #12)
> Version has been bumped, with all USE flags as the previous version.
> No need to stabilize it since 0.99 is the development branch.
> 

Err, so this vulnerabilitty was only affecting the 0.99 branch, and 0.98 is safe and we can close this a noglsa since it's ~arch? because if it's not the case and 0.98 was vulnerable to this, we would need a fixed ebuild to stabilize.
Comment 14 Alin Năstac (RETIRED) gentoo-dev 2008-06-19 22:15:57 UTC
I made a mistake in the new version by applying freeasform (aka bg4) patch while the new version already supports this without any patch.

I've fixed that in 0.99.10-r1 revision.

As for DoS problem being present in 0.98 versions or not... What I understand from that page is they had bugs in the previous AS4 code, but 0.98 versions do not have such support, ergo they should not be affected. However, if you find a security patch that needs to be backported, just let me know.
Comment 15 Jonathan Thibault 2009-11-27 20:26:30 UTC
Instead of modifying the init script to hardcode the bind addresses, how about having a /etc/conf.d entries with defaults such as BGPD_OPTS="-A 127.0.0.1"?  It would let us specify other options too.  All those .init files should just include the proper ${daemon_opts}