CVE-2018-5378 (retired)

Priority
Description
The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly
bounds check the data sent with a NOTIFY to a peer, if an attribute length
is invalid. Arbitrary data from the bgpd process may be sent over the
network to a peer and/or bgpd may crash.
Notes
 mdeslaur> this is Quagga-2018-0543
Assigned-to
mdeslaur
Package
Upstream:released (1.2.3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.2.2-1ubuntu1)
More Information

Updated: 2019-09-19 16:06:35 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)