Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-0377

Опубликовано: 28 фев. 2018
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2018-0377: quagga security update (IMPORTANT)

[0.99.22.4-5]

  • Fixed CVE-2018-5379 - Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code
  • Resolves: rhbz#1546015

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

quagga

0.99.22.4-5.el7_4

quagga-contrib

0.99.22.4-5.el7_4

quagga-devel

0.99.22.4-5.el7_4

Oracle Linux x86_64

quagga

0.99.22.4-5.el7_4

quagga-contrib

0.99.22.4-5.el7_4

quagga-devel

0.99.22.4-5.el7_4

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.

CVSS3: 8.1
redhat
почти 8 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.

CVSS3: 7.5
nvd
больше 7 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.

CVSS3: 7.5
debian
больше 7 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free me ...

CVSS3: 9.8
github
больше 3 лет назад

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.