An assertion failure was found in the way Quagga's bgpd daemon processed certain BGP OPEN messages. A configured BGP peer could send a BGP OPEN message with specially-crafted value of AS4 capability field, which would cause the master BGP daemon (bgpd) to abort (denial of service). Upstream patch: [1] http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=5861739f8c38bc36ea9955e5cb2be2bf2f482d70
This issue did NOT affect the version of the quagga package, as shipped with Red Hat Enterprise Linux 5. -- This issue affects the version of the quagga package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the versions of the quagga package, as shipped with Fedora release of 15 and 16.
The CVE identifier of CVE-2012-0255 has been assigned to this issue.
Public via: http://www.kb.cert.org/vuls/id/551715
Created quagga tracking bugs for this issue Affects: fedora-all [bug 808357]
quagga-0.99.20.1-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
quagga-0.99.20.1-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
quagga-0.99.20.1-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1259 https://rhn.redhat.com/errata/RHSA-2012-1259.html
Acknowledgements: Red Hat would like to thank the CERT/CC for reporting this issue. The CERT/CC acknowledges Martin Winter at OpenSourceRouting.org as the original reporter.