Debian 10225 Published by

The following two updates has been released for Debian 7 LTS:

[DLA 601-1] quagga security update
[DLA 603-1] ruby-activesupport-3.2 security update



[DLA 601-1] quagga security update

Package : quagga
Version : 0.99.22.4-1+wheezy3
CVE ID : CVE-2016-4036 CVE-2016-4049
Debian Bug : 835223, 822787

The quagga package installs world readable sensitive files in /etc/quagga,
and might be subject to denial of service because of lacking packet size
checks.

CVE-2016-4036

The quagga package before 0.99.23-2.6.1 uses weak permissions for
/etc/quagga, which allows local users to obtain sensitive information
by reading files in the directory.

CVE-2016-4049

The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does
not perform size checks when dumping data, which might allow remote
attackers to cause a denial of service (assertion failure and daemon
crash) via a large BGP packet.

For Debian 7 "Wheezy", these problems have been fixed in version
0.99.22.4-1+wheezy3.

We recommend that you upgrade your quagga packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

[DLA 603-1] ruby-activesupport-3.2 security update

Package : ruby-activesupport-3.2
Version : 3.2.6-6+deb7u2
CVE ID : CVE-2015-3227

The support and utility classes used by the Rails 3.2 framework allow
remote attackers to cause a denial of service (SystemStackError) via a
large XML document depth.

For Debian 7 "Wheezy", these problems have been fixed in version
3.2.6-6+deb7u2.

Additionally this upload adds 'active_support/security_utils' that will
be used by ruby-actionpack-3.2 to address CVE-2015-7576.

We recommend that you upgrade your ruby-activesupport-3.2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS