Description
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1286-1 | quagga security update |
Debian DSA |
DSA-4115-1 | quagga security update |
Ubuntu USN |
USN-3573-1 | Quagga vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Quagga
Subscribe
Quagga
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Siemens
Subscribe
Ruggedcom Rox Ii
Subscribe
Ruggedcom Rox Ii Firmware
Subscribe
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-09-17T03:22:36.451Z
Reserved: 2018-01-12T00:00:00.000Z
Link: CVE-2018-5379
No data.
Status : Modified
Published: 2018-02-19T13:29:00.413
Modified: 2024-11-21T04:08:41.997
Link: CVE-2018-5379
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN