--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2018-9cd3ff3784
2018-03-06 17:17:51.856062
--------------------------------------------------------------------------------Name        : quagga
Product     : Fedora 27
Version     : 1.2.2
Release     : 2.fc27
URL         : Summary     : Routing daemon
Description :
Quagga is free software that operates TCP/IP-based routing protocols. It takes
a multi-server and multi-threaded approach to resolving the current complexity
of the Internet.

Quagga supports Babel, BGP4, BGP4+, BGP4-, IS-IS (experimental), OSPFv2,
OSPFv3, RIPv1, RIPv2, RIPng, PIM-SSM and NHRP.

Quagga is intended to be used as a Route Server and a Route Reflector. It is
not a toolkit; it provides full routing power under a new architecture.
Quagga by design has a process for each protocol.

Quagga is a fork of GNU Zebra.

--------------------------------------------------------------------------------Update Information:

Fixed CVE-2018-5379 - Double free vulnerability in bgpd when processing
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1546008 - CVE-2018-5379 quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1546008
  [ 2 ] Bug #1546006 - CVE-2018-5380 quagga: bgpd can overrun internal BGP code-to-string conversion tables potentially allowing crash [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1546006
  [ 3 ] Bug #1546004 - CVE-2018-5381 quagga: Infinite loop issue triggered by invalid OPEN message allows denial-of-service [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1546004
  [ 4 ] Bug #1546009 - CVE-2018-5378 quagga: bgpd does not properly bounds check the data sent with a NOTIFY allowing leak of sensitive data or crash [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1546009
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade quagga' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora 27: quagga Security Update

March 6, 2018
Fixed CVE-2018-5379 - Double free vulnerability in bgpd when processing

Summary

Quagga is free software that operates TCP/IP-based routing protocols. It takes

a multi-server and multi-threaded approach to resolving the current complexity

of the Internet.

Quagga supports Babel, BGP4, BGP4+, BGP4-, IS-IS (experimental), OSPFv2,

OSPFv3, RIPv1, RIPv2, RIPng, PIM-SSM and NHRP.

Quagga is intended to be used as a Route Server and a Route Reflector. It is

not a toolkit; it provides full routing power under a new architecture.

Quagga by design has a process for each protocol.

Quagga is a fork of GNU Zebra.

Fixed CVE-2018-5379 - Double free vulnerability in bgpd when processing

[ 1 ] Bug #1546008 - CVE-2018-5379 quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1546008

[ 2 ] Bug #1546006 - CVE-2018-5380 quagga: bgpd can overrun internal BGP code-to-string conversion tables potentially allowing crash [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1546006

[ 3 ] Bug #1546004 - CVE-2018-5381 quagga: Infinite loop issue triggered by invalid OPEN message allows denial-of-service [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1546004

[ 4 ] Bug #1546009 - CVE-2018-5378 quagga: bgpd does not properly bounds check the data sent with a NOTIFY allowing leak of sensitive data or crash [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1546009

su -c 'dnf upgrade quagga' at the command line.

For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

FEDORA-2018-9cd3ff3784 2018-03-06 17:17:51.856062 Product : Fedora 27 Version : 1.2.2 Release : 2.fc27 URL : Summary : Routing daemon Description : Quagga is free software that operates TCP/IP-based routing protocols. It takes a multi-server and multi-threaded approach to resolving the current complexity of the Internet. Quagga supports Babel, BGP4, BGP4+, BGP4-, IS-IS (experimental), OSPFv2, OSPFv3, RIPv1, RIPv2, RIPng, PIM-SSM and NHRP. Quagga is intended to be used as a Route Server and a Route Reflector. It is not a toolkit; it provides full routing power under a new architecture. Quagga by design has a process for each protocol. Quagga is a fork of GNU Zebra. Fixed CVE-2018-5379 - Double free vulnerability in bgpd when processing [ 1 ] Bug #1546008 - CVE-2018-5379 quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1546008 [ 2 ] Bug #1546006 - CVE-2018-5380 quagga: bgpd can overrun internal BGP code-to-string conversion tables potentially allowing crash [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1546006 [ 3 ] Bug #1546004 - CVE-2018-5381 quagga: Infinite loop issue triggered by invalid OPEN message allows denial-of-service [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1546004 [ 4 ] Bug #1546009 - CVE-2018-5378 quagga: bgpd does not properly bounds check the data sent with a NOTIFY allowing leak of sensitive data or crash [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1546009 su -c 'dnf upgrade quagga' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 27
Version : 1.2.2
Release : 2.fc27
URL : Summary : Routing daemon

Related News