CVE-2017-16227 (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16227): The aspath_put function in bgpd/bgp_aspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequently constructs an invalid message. References: http://download.savannah.gnu.org/releases/quagga/quagga-1.2.2.changelog.txt https://bugs.debian.org/879474 https://git.savannah.gnu.org/cgit/quagga.git/commit/?id=7a42b78be9a4108d98833069a88e6fddb9285008 https://lists.quagga.net/pipermail/quagga-dev/2017-September/033284.html
commit 8b52a9fcb08c6ad23d8e0c664bdad11ce9765ca5 Author: Sergey Popov <pinkbyte@gentoo.org> Date: Thu Nov 30 12:14:26 2017 +0300 net-misc/quagga: version bump Remove obsolete ospfapi configure options Gentoo-Bug: 635858 Gentoo-Bug: 638892 Package-Manager: Portage-2.3.16, Repoman-2.3.6 Arches, please test and mark stable =net-misc/quagga-1.2.2 Target keywords: alpha amd64 arm hppa ppc x86
x86 stable
amd64 stable
hppa stable (thanks to Rolf Eike Beer)
arm stable
sparc is no longer a stable arch and test failures do not block security bugs. @arches, please finish stabilizing.
Stable on alpha.
sparc did 1.2.2-r1
@ppc, ping.
ppc stable Last arch, no glsa, closing