First published: Tue Oct 17 2023(Updated: )
It was discovered that the Quagga BGP daemon did not properly check the attribute length in NRLI. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-41358) It was discovered that the Quagga BGP daemon did not properly manage memory when reading initial bytes of ORF header. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-41360)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/quagga | <1.2.4-4ubuntu0.1 | 1.2.4-4ubuntu0.1 |
=20.04 | ||
All of | ||
ubuntu/quagga | <1.2.4-1ubuntu0.1~esm1 | 1.2.4-1ubuntu0.1~esm1 |
=18.04 | ||
All of | ||
ubuntu/quagga | <0.99.24.1-2ubuntu1.4+esm1 | 0.99.24.1-2ubuntu1.4+esm1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Quagga vulnerability is CVE-2023-41358.
The impact of the Quagga vulnerability CVE-2023-41358 is a possible denial of service.
An attacker can exploit the Quagga vulnerability CVE-2023-41358 by manipulating attribute length in NRLI.
Versions 1.2.4-4ubuntu0.1, 1.2.4-1ubuntu0.1~esm1, and 0.99.24.1-2ubuntu1.4+esm1 of Quagga are affected by this vulnerability.
To fix the Quagga vulnerability CVE-2023-41358, update Quagga to version 1.2.4-4ubuntu0.1 (for Ubuntu 20.04), version 1.2.4-1ubuntu0.1~esm1 (for Ubuntu 18.04), or version 0.99.24.1-2ubuntu1.4+esm1 (for Ubuntu 16.04).