CVE-2021-44038
Published: 19 November 2021
An issue was discovered in Quagga through 1.2.4. Unsafe chown/chmod operations in the suggested spec file allow users (with control of the non-root-owned directory /etc/quagga) to escalate their privileges to root upon package installation or update.
Notes
Author | Note |
---|---|
sbeattie | the debian packaging installs the vulnerable systemd unit files |
mdeslaur | it looks like the upstream quagga project repo is dead since the project got forked as frr. The systemd unit files are in the redhat directory. no upstream fix as of 2022-01-05 |
Priority
Status
Package | Release | Status |
---|---|---|
quagga Launchpad, Ubuntu, Debian |
bionic |
Deferred
|
focal |
Deferred
|
|
hirsute |
Ignored
(end of life)
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
mantic |
Does not exist
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Deferred
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |