Bug 876197 (CVE-2012-5521) - CVE-2012-5521 quagga (ospf6d): Assertion failure when removing routes (retrieving information which route to remove)
Summary: CVE-2012-5521 quagga (ospf6d): Assertion failure when removing routes (retrie...
Alias: CVE-2012-5521
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 876210
Blocks: 876213
TreeView+ depends on / blocked
Reported: 2012-11-13 14:35 UTC by Jan Lieskovsky
Modified: 2021-02-17 08:24 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2015-08-22 15:04:00 UTC

Attachments (Terms of Use)

Description Jan Lieskovsky 2012-11-13 14:35:39 UTC
A denial of service flaw was found in the way Quagga's ospf6d daemon performed routes removal. In certain circumstances when removing the route the ospf6d daemon terminated with assertion failure when trying to determine / find, which route to remove. An OSPF6 router could use this flaw to cause ospf6d on an adjacent router to abort.

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693102

Upstream bug report:
[2] https://bugzilla.quagga.net/show_bug.cgi?id=747

Comment 1 Jan Lieskovsky 2012-11-13 15:08:37 UTC
This issue affects the versions of the quagga package, as shipped with Red Hat Enterprise Linux 5 and 6.


This issue affects the versions of the quagga package, as shipped with Fedora release of 16 and 17. Please schedule an update (once there is final upstream patch for this issue available).

Comment 2 Jan Lieskovsky 2012-11-13 15:09:17 UTC
CVE Request:
[3] http://www.openwall.com/lists/oss-security/2012/11/13/7

Comment 3 Jan Lieskovsky 2012-11-13 15:10:25 UTC
Created quagga tracking bugs for this issue

Affects: fedora-all [bug 876210]

Comment 4 Kurt Seifried 2012-11-13 18:28:54 UTC
Added CVE as per http://www.openwall.com/lists/oss-security/2012/11/13/14

Comment 7 Vincent Danen 2015-08-22 15:03:45 UTC

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Note You need to log in before you can comment on or make changes to this bug.