CVE-2017-16227: bgpd Daemon in the FRRouting (FRR) and Quagga Suites Does not Properly Calculate the Length of Multi-segment AS_PATH UPDATE Messages

Follow

Note: This issue was announced on the Cumulus Networks security announcement mailing list on November 6, 2017.

As reported in CVE-2017-16227, the bgpd daemon in the FRRouting (FRR) and Quagga suites does not properly calculate the length of multi-segment AS_PATH UPDATE messages, causing bgpd to drop a session and potentially resulting in loss of network connectivity.

The bgpd daemon will be restarted automatically with the shipped configuration for both FRR and Quagga, so the loss in routing connectivity will be brief.

This will be fixed in FRR in Cumulus Linux 3.5.0. Quagga will be fixed in Cumulus Linux 2.5.13.

We recommend that you upgrade Cumulus Linux and Cumulus RMP when the updated versions are available.

For instructions on how to apply the latest security upgrades, please refer to this Help Center article.

Regarding previous Debian security upgrades for Cumulus Linux and Cumulus RMP: The Cumulus Linux and Cumulus RMP binary images by default include all Debian security updates available prior to the build date.

The Cumulus Linux and Cumulus RMP image files use the following naming format: <X.Y.Z release>-<md5sum>-<build date>-final.

Customers can identify security vulnerabilities by correlating a build date with the dates of Debian security updates posted at http://www.debian.org/security/.

If you have any questions, please contact us at support at cumulusnetworks.com.

Have more questions? Submit a request

Comments

Powered by Zendesk