MGASA-2017-0416

Source
https://advisories.mageia.org/MGASA-2017-0416.html
Import Source
https://advisories.mageia.org/MGASA-2017-0416.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0416
Related
Published
2017-11-19T10:23:35Z
Modified
2017-11-19T09:59:24Z
Summary
Updated quagga packages fix security vulnerability
Details

The bgpd daemon in the Quagga routing suite does not properly calculate the length of multi-segment AS_PATH UPDATE messages, causing bgpd to drop a session and potentially resulting in loss of network connectivity (CVE-2017-16227).

References
Credits

Affected packages

Mageia:6 / quagga

Package

Name
quagga
Purl
pkg:rpm/mageia/quagga?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.99.24.1-6.1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / quagga

Package

Name
quagga
Purl
pkg:rpm/mageia/quagga?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.99.22.4-4.5.mga5

Ecosystem specific

{
    "section": "core"
}