[cumulus-security-announce] Cumulus Networks Security Advisory (CVE-2017-16227)

Cumulus Networks Security Announcements cumulus-security-announce at lists.cumulusnetworks.com
Mon Nov 6 17:52:08 PST 2017


-------------------------------------------------------------------------
Cumulus Networks® Security Advisory
2017-November-5
-------------------------------------------------------------------------

CVE ID: CVE-2017-16227 https://security-tracker.debian.org/tracker/CVE-2017-16227

Description: As reported in CVE-2017-16227, the bgpd daemon in the FRRouting (FRR) and Quagga suites does not properly calculate the length of multi-segment AS_PATH UPDATE messages, causing bgpd to drop a session and potentially resulting in loss of network connectivity.

The bgpd daemon will be restarted automatically with the shipped configuration for both FRR and Quagga, so the loss in routing connectivity will be brief.

This will be fixed in FRR in Cumulus Linux 3.5.0. Quagga will be fixed in Cumulus Linux 2.5.13.

We recommend that you upgrade Cumulus Linux and Cumulus RMP when the updated versions are available.

For instructions on how to apply the latest security upgrades, please refer to this Help Center article: https://support.cumulusnetworks.com/hc/en-us/articles/201787906

Regarding previous Debian security upgrades for Cumulus Linux and Cumulus RMP: The Cumulus Linux and Cumulus RMP binary images by default include all Debian security updates available prior to the build date.

The Cumulus Linux and Cumulus RMP image files use the following naming format: <X.Y.Z release>-<md5sum>-<build date>-final.
Customers can identify security vulnerabilities by correlating a build date with the dates of Debian security updates posted at http://www.debian.org/security/.

If you have any questions, please contact us at support at cumulusnetworks.com.

The Cumulus Networks Team



More information about the cumulus-security-announce mailing list