Public Date:
1542985: CVE-2018-5379 quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code
A double-free vulnerability was found in Quagga. A BGP peer could send a specially crafted UPDATE message which would cause allocated blocks of memory to be free()d more than once, potentially leading to a crash or other issues.

Find out more about CVE-2018-5379 from the MITRE CVE dictionary dictionary and NIST NVD.


Glibc's heap protection mitigations render this issue more difficult to exploit, though bypasses may still be possible.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 8.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (quagga) RHSA-2018:0377 2018-02-28

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 quagga Will not fix
Red Hat Enterprise Linux 5 quagga Will not fix


Red Hat would like to thank the Quagga project for reporting this issue.

External References

Last Modified