First published: Thu Feb 15 2018(Updated: )
Last updated 24 July 2024
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Quagga Quagga | <=1.2.2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
debian/quagga |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5378 refers to a vulnerability in the Quagga BGP daemon (bgpd) prior to version 1.2.3 that allows for arbitrary data to be sent over the network to a peer and may cause the bgpd process to crash.
CVE-2018-5378 has a severity level of high, with a CVSS score of 5.9.
Quagga versions prior to 1.2.3 are affected, including Debian Linux 8.0, Debian Linux 9.0, Canonical Ubuntu Linux 14.04, Canonical Ubuntu Linux 16.04, and Canonical Ubuntu Linux 17.10.
To fix CVE-2018-5378, update Quagga to version 1.2.3 or later, such as version 1.2.4-3 for Debian or the appropriate remedy for your specific Linux distribution.
You can find more information about CVE-2018-5378 at the following references: [http://savannah.nongnu.org/forum/forum.php?forum_id=9095](http://savannah.nongnu.org/forum/forum.php?forum_id=9095), [http://www.kb.cert.org/vuls/id/940439](http://www.kb.cert.org/vuls/id/940439), [https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-0543.txt](https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-0543.txt).