[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1286-1] quagga security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : quagga
Version        : 0.99.22.4-1+wheezy3+deb7u3
CVE ID         : CVE-2018-5379 CVE-2018-5380 CVE-2018-5381


Several vulnerabilities have been discovered in Quagga, a routing
daemon. The Common Vulnerabilities and Exposures project identifies the
following issues:

CVE-2018-5378

    It was discovered that the Quagga BGP daemon, bgpd, does not
    properly bounds check data sent with a NOTIFY to a peer, if an
    attribute length is invalid. A configured BGP peer can take
    advantage of this bug to read memory from the bgpd process or cause
    a denial of service (daemon crash).

    https://www.quagga.net/security/Quagga-2018-0543.txt

CVE-2018-5379

    It was discovered that the Quagga BGP daemon, bgpd, can double-free
    memory when processing certain forms of UPDATE message, containing
    cluster-list and/or unknown attributes, resulting in a denial of
    service (bgpd daemon crash).

    https://www.quagga.net/security/Quagga-2018-1114.txt

CVE-2018-5380

    It was discovered that the Quagga BGP daemon, bgpd, does not
    properly handle internal BGP code-to-string conversion tables.

    https://www.quagga.net/security/Quagga-2018-1550.txt

CVE-2018-5381

    It was discovered that the Quagga BGP daemon, bgpd, can enter an
    infinite loop if sent an invalid OPEN message by a configured peer.
    A configured peer can take advantage of this flaw to cause a denial
    of service (bgpd daemon not responding to any other events; BGP
    sessions will drop and not be reestablished; unresponsive CLI
    interface).

    https://www.quagga.net/security/Quagga-2018-1975.txt


For Debian 7 "Wheezy", these problems have been fixed in version
0.99.22.4-1+wheezy3+deb7u3.

We recommend that you upgrade your quagga packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQJ8BAEBCgBmBQJah1vuXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5
NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHe4wQAMd/6shLSZuD7cVnldF7nCqd
P1gzFGKF7FulPpne6StEaFs5RhpitvgZLgNqXTSWaP1Z7RydxK/Q3bJpFUleBZmW
dyLtE+5rl8g2JzbwYXNYkcgXlCYFT3tDejiZK3RxtqaEdIss7VS8j5qL+0pLxJs4
5CCWmla/+zg2vUqbW6/yQG0mLfX3WyWZshPblM33gBJcC7jF5bsvZG1+gfVEZVSX
WW7SByintBtbGXHCryu4BccGZUyyX0jWPpfRhCLT6QCwbH4HXVB2U+oBXRiVGw0f
XMo/+wSqjRwvOWcfIccEVrpQnfgYk5pn+hGsInuyKe9wOxN1X9+SArR6LpB/qTEE
jo1ch4JZRNRkAa8fanyRDn9AuYZhJdZ5lLKwr1uzdw+3SV/oQ35D42kxNRh2hgPb
W5lz2W8Fm7h3dAKaRcgJRA3QxRlppTl/hPRciOIAeIJAfZ0oDEpkzsoWEnTrI3Uy
/bD3FF53n7vZ4JoAlnBKCy02YmtvAKzDwTammhvZZXq8sqsG54YVSK1NemVlnI4j
fBKOMXGfj9Kk8QrjZ7Z/JzLDuEQw7K0IYyxAD7ptFJSk4sqXJziTfck6Q2e57iEg
xwCwTXiQHF8zTFvddVtejkbHzczgl5og3aBMy2V+L9IEERnZMjpD8iARX/63891y
FIRnxkClUOft5cN5yHf5
=PvX2
-----END PGP SIGNATURE-----


Reply to: