{"id":"MGASA-2017-0071","summary":"Updated quagga packages fix security vulnerability","details":"All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded\nmemory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service\nof Quagga daemons, or even the entire host (CVE-2017-5495).\n","modified":"2026-04-16T01:46:13.746832548Z","published":"2017-03-03T10:09:43Z","upstream":["CVE-2017-5495"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0071.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=20271"},{"type":"WEB","url":"https://lists.quagga.net/pipermail/quagga-dev/2017-January/016586.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/NKP6QWJW7XWDE4O42UCR5L534GOHVIQN/"}],"affected":[{"package":{"name":"quagga","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/quagga?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.99.22.4-4.4.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0071.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}