Name | CVE-2018-5378 |
Description | The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 890563 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
quagga (PTS) | jessie, jessie (lts) | 0.99.23.1-1+deb8u5 | fixed |
| stretch (security), stretch (lts), stretch | 1.1.1-3+deb9u2 | fixed |
| buster | 1.2.4-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
quagga | source | wheezy | (not affected) | | | |
quagga | source | jessie | (not affected) | | | |
quagga | source | stretch | 1.1.1-3+deb9u2 | | | |
quagga | source | (unstable) | 1.2.4-1 | | | 890563 |
Notes
[jessie] - quagga <not-affected> (Vulnerable code not present)
[wheezy] - quagga <not-affected> (Vulnerable code not present)
https://www.quagga.net/security/Quagga-2018-0543.txt
https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=cc2e6770697e343f4af534114ab7e633d5beabec