vulnerability
SUSE: CVE-2018-5378: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:M/Au:S/C:P/I:N/A:P) | Feb 16, 2018 | Mar 3, 2020 | Jun 20, 2021 |
Severity
5
CVSS
(AV:N/AC:M/Au:S/C:P/I:N/A:P)
Published
Feb 16, 2018
Added
Mar 3, 2020
Modified
Jun 20, 2021
Description
The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.
Solutions
suse-upgrade-libfpm_pb0suse-upgrade-libospf0suse-upgrade-libospfapiclient0suse-upgrade-libquagga_pb0suse-upgrade-libzebra1suse-upgrade-quaggasuse-upgrade-quagga-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.