Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-5379
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:44.333Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3573-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3573-1/" }, { "name": "DSA-4115", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4115" }, { "name": "103105", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103105" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "name": "GLSA-201804-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201804-17" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt" }, { "name": "[debian-lts-announce] 20180216 [SECURITY] [DLA 1286-1] quagga security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html" }, { "name": "VU#940439", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/940439" }, { "name": "RHSA-2018:0377", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "bgpd", "vendor": "Quagga", "versions": [ { "lessThan": "1.2.3", "status": "affected", "version": "bpgd", "versionType": "custom" } ] } ], "datePublic": "2018-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415: Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-09T12:06:06", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "USN-3573-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3573-1/" }, { "name": "DSA-4115", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4115" }, { "name": "103105", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103105" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "name": "GLSA-201804-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201804-17" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt" }, { "name": "[debian-lts-announce] 20180216 [SECURITY] [DLA 1286-1] quagga security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html" }, { "name": "VU#940439", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/940439" }, { "name": "RHSA-2018:0377", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "DATE_PUBLIC": "2018-02-15T00:00:00.000Z", "ID": "CVE-2018-5379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "bgpd", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "bpgd", "version_value": "1.2.3" } ] } } ] }, "vendor_name": "Quagga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-415: Double Free" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3573-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3573-1/" }, { "name": "DSA-4115", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4115" }, { "name": "103105", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103105" }, { "name": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095", "refsource": "CONFIRM", "url": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "name": "GLSA-201804-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-17" }, { "name": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt", "refsource": "CONFIRM", "url": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt" }, { "name": "[debian-lts-announce] 20180216 [SECURITY] [DLA 1286-1] quagga security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html" }, { "name": "VU#940439", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/940439" }, { "name": "RHSA-2018:0377", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2018-5379", "datePublished": "2018-02-19T13:00:00Z", "dateReserved": "2018-01-12T00:00:00", "dateUpdated": "2024-09-17T03:22:36.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.2.2\", \"matchCriteriaId\": \"5117934B-9B41-4ECF-807D-252F6CA1CF97\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9070C9D8-A14A-467F-8253-33B966C16886\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EF4996-72F4-4FA4-814F-F5991E7A8318\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D99A687E-EAE6-417E-A88E-D0082BC194CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B353CE99-D57C-465B-AAB0-73EF581127D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.13.0\", \"matchCriteriaId\": \"CBDC4817-0B21-45A9-A384-AECE46E2EBC2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EA04F52-40D0-4A4B-9767-265A26EFD98D\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.\"}, {\"lang\": \"es\", \"value\": \"El demonio Quagga BGP (bgpd), en versiones anteriores a la 1.2.3, puede realizar una doble liberaci\\u00f3n (double free) de memoria al procesar ciertos formularios de un mensaje UPDATE que contienen atributos cluster-list y/o desconocidos. Un ataque con \\u00e9xito podr\\u00eda provocar una denegaci\\u00f3n de servicio (DoS) o permitir que un atacante ejecute c\\u00f3digo arbitrario.\"}]", "id": "CVE-2018-5379", "lastModified": "2024-11-21T04:08:41.997", "metrics": "{\"cvssMetricV30\": [{\"source\": \"cret@cert.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2018-02-19T13:29:00.413", "references": "[{\"url\": \"http://savannah.nongnu.org/forum/forum.php?forum_id=9095\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/940439\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/103105\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:0377\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html\", \"source\": \"cret@cert.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201804-17\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3573-1/\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4115\", \"source\": \"cret@cert.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://savannah.nongnu.org/forum/forum.php?forum_id=9095\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/940439\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/103105\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:0377\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201804-17\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3573-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4115\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"cret@cert.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-415\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-415\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2018-5379\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2018-02-19T13:29:00.413\",\"lastModified\":\"2024-11-21T04:08:41.997\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.\"},{\"lang\":\"es\",\"value\":\"El demonio Quagga BGP (bgpd), en versiones anteriores a la 1.2.3, puede realizar una doble liberaci\u00f3n (double free) de memoria al procesar ciertos formularios de un mensaje UPDATE que contienen atributos cluster-list y/o desconocidos. Un ataque con \u00e9xito podr\u00eda provocar una denegaci\u00f3n de servicio (DoS) o permitir que un atacante ejecute c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"cret@cert.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cret@cert.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.2\",\"matchCriteriaId\":\"5117934B-9B41-4ECF-807D-252F6CA1CF97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.13.0\",\"matchCriteriaId\":\"CBDC4817-0B21-45A9-A384-AECE46E2EBC2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA04F52-40D0-4A4B-9767-265A26EFD98D\"}]}]}],\"references\":[{\"url\":\"http://savannah.nongnu.org/forum/forum.php?forum_id=9095\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/940439\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/103105\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0377\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201804-17\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3573-1/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4115\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://savannah.nongnu.org/forum/forum.php?forum_id=9095\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/940439\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/103105\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0377\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201804-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3573-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
icsa-19-099-05
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could result in remote code execution and/or a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy, Healthcare and Public Health, Transportation Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and \nsolutions, please contact the Siemens ProductCERT:\n\nhttps://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-099-05 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-099-05.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-099-05 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-099-05" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-496604: SSA-451142: Multiple Vulnerabilities in RUGGEDCOM ROX II - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/SSA-451142.txt" } ], "title": "Siemens RUGGEDCOM ROX II", "tracking": { "current_release_date": "2019-04-09T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-099-05", "initial_release_date": "2019-04-09T00:00:00.000000Z", "revision_history": [ { "date": "2019-04-09T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-099-05 Siemens RUGGEDCOM ROX II" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V2.13.0", "product": { "name": "RUGGEDCOM ROX II: All versions \u003c V2.13.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "RUGGEDCOM ROX II" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5379", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The shipped version of the Quagga BGP daemon (bgpd) can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker spoofing a malicious BGP UPDATE message within the network. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality, integrity and availability of the affected system.", "title": "Summary" }, { "category": "summary", "text": "At the time of advisory publication no public exploitation of this security vulnerability was known.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5379" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Disable the BGP routing service if not in use in your setup.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Configure BGP passwords to authenticate BGP neighbours.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-5380", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The shipped version of the Quagga BGP daemon (bgpd) can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker spoofing a malicious BGP code-point. Successful exploitation requires the attacker to be in the position of a configured, trusted BGP peer. No system privileges and no user interaction is required. An attacker could use the vulnerability to insert binary data into the internal log files.", "title": "Summary" }, { "category": "summary", "text": "At the time of advisory publication no public exploitation of this security vulnerability was known.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5380" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Disable the BGP routing service if not in use in your setup.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Configure BGP passwords to authenticate BGP neighbours.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-5381", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The shipped version of the Quagga BGP daemon (bgpd) has a bug in its parsing of \"Capabilities\" in BGP OPEN messages. The parser can enter an infinite loop on invalid capabilities causing a denial of service.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker spoofing a malicious BGP OPEN message. Successful exploitation requires the attacker to be in the position of a configured, trusted BGP peer. No system privileges and no user interaction is required. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the affected system.", "title": "Summary" }, { "category": "summary", "text": "At the time of advisory publication no public exploitation of this security vulnerability was known.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5381" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Disable the BGP routing service if not in use in your setup.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Configure BGP passwords to authenticate BGP neighbours.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
ICSA-19-099-05
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could result in remote code execution and/or a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy, Healthcare and Public Health, Transportation Systems", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and \nsolutions, please contact the Siemens ProductCERT:\n\nhttps://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-099-05 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-099-05.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-099-05 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-099-05" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-496604: SSA-451142: Multiple Vulnerabilities in RUGGEDCOM ROX II - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/SSA-451142.txt" } ], "title": "Siemens RUGGEDCOM ROX II", "tracking": { "current_release_date": "2019-04-09T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-099-05", "initial_release_date": "2019-04-09T00:00:00.000000Z", "revision_history": [ { "date": "2019-04-09T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-099-05 Siemens RUGGEDCOM ROX II" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V2.13.0", "product": { "name": "RUGGEDCOM ROX II: All versions \u003c V2.13.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "RUGGEDCOM ROX II" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-5379", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The shipped version of the Quagga BGP daemon (bgpd) can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker spoofing a malicious BGP UPDATE message within the network. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality, integrity and availability of the affected system.", "title": "Summary" }, { "category": "summary", "text": "At the time of advisory publication no public exploitation of this security vulnerability was known.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5379" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Disable the BGP routing service if not in use in your setup.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Configure BGP passwords to authenticate BGP neighbours.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-5380", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The shipped version of the Quagga BGP daemon (bgpd) can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker spoofing a malicious BGP code-point. Successful exploitation requires the attacker to be in the position of a configured, trusted BGP peer. No system privileges and no user interaction is required. An attacker could use the vulnerability to insert binary data into the internal log files.", "title": "Summary" }, { "category": "summary", "text": "At the time of advisory publication no public exploitation of this security vulnerability was known.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5380" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Disable the BGP routing service if not in use in your setup.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Configure BGP passwords to authenticate BGP neighbours.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-5381", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The shipped version of the Quagga BGP daemon (bgpd) has a bug in its parsing of \"Capabilities\" in BGP OPEN messages. The parser can enter an infinite loop on invalid capabilities causing a denial of service.", "title": "Summary" }, { "category": "summary", "text": "The security vulnerability could be exploited by an attacker spoofing a malicious BGP OPEN message. Successful exploitation requires the attacker to be in the position of a configured, trusted BGP peer. No system privileges and no user interaction is required. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the affected system.", "title": "Summary" }, { "category": "summary", "text": "At the time of advisory publication no public exploitation of this security vulnerability was known.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5381" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Disable the BGP routing service if not in use in your setup.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Configure BGP passwords to authenticate BGP neighbours.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
var-201802-1049
Vulnerability from variot
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code. Quagga bgpd Contains several vulnerabilities: * Buffer overflow (CWE-119) - CVE-2018-5378 (Quagga-2018-0543) * Double memory release (CWE-415) - CVE-2018-5379 (Quagga-2018-1114) * Out of bounds read (CWE-125) - CVE-2018-5380 (Quagga-2018-1550) * Improper handling of incorrect syntactic constructs (CWE-228) - CVE-2018-5381 (Quagga-2018-1975) Detail is Information provided by the developer Please refer to.The expected impact depends on each vulnerability, but remote code execution, information leakage, service operation interruption by a remote third party (DoS) An attack could be made. Quagga is prone to a remote code-execution vulnerability. Failed exploit attempts will likely cause a denial-of-service condition. Versions prior to Quagga 1.2.3 are vulnerable. A configured peer can take advantage of this flaw to cause a denial of service (bgpd daemon not responding to any other events; BGP sessions will drop and not be reestablished; unresponsive CLI interface).
https://www.quagga.net/security/Quagga-2018-1975.txt
For the oldstable distribution (jessie), these problems have been fixed in version 0.99.23.1-1+deb8u5.
For the stable distribution (stretch), these problems have been fixed in version 1.1.1-3+deb9u2.
We recommend that you upgrade your quagga packages.
For the detailed security status of quagga please refer to its security tracker page at: https://security-tracker.debian.org/tracker/quagga
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlqGBaVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RpyRAAhVpntFw+LSUUzL2/cx7m+s4fHijhOkU/AjKKmW4a9rAi0iJYW4HNv5BU cKfz6yhngFUzCa+Glhmiwzt77eAoeksJSvxkKio5CTqjV3OxCWbDPPz/iRRHcKvK MGhnqyShMCF8boQU0plmqNbfhnSWNAObbaI2fPmjLOU4A4jPY1T/fbzu4Sd3k5qY ETeHq9+HlVdGnyNEoYnoO0XQH56ueNHy3VlChJ0S2OPtFtoKXkjM/er+yG6413+G 3e90tcbm2xlitmrTyZm9K/Q08UWLJx510n1rxehaO1DTEz+bqSNezySOhyNb8sTA fuadDpgs2ozwgSmxyuWFj0RL3fKvgycw1ZeNiS5nUmRJTobrPlnjyX+A8FEJhPuI 9xyVa8j6wUeBVZdgd9b/EWLQ1Z9oDRiXmHRJeVOtz4JRNPP1KLtBcsPxFW9eCp83 9gFMqk/vMYQSpRqtQdnl5OawEpeurMtusBsnlEV5y9afiHU9jKB8N7RPwxCJgtjP /jmhS4lOvn3F5lNILahaL3lrk/b0EsECajBltbN9YVU0yabWWRWSMrJ3ujamhaXE aUQKmVj1alwDyg90vToiUftdr3R0hPPFuzA0BAK55SJVzjwJ2XInzItr+2y1tMPn dSpd32tzrxpDm86rvmRIiAJbj28n7QnX9I9BlKZqWq2fUUhTkNg= =Gy8j -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: quagga security update Advisory ID: RHSA-2018:0377-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:0377 Issue date: 2018-02-28 CVE Names: CVE-2018-5379 =====================================================================
- Summary:
An update for quagga is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le
- Description:
The quagga packages contain Quagga, the free network-routing software suite that manages TCP/IP based protocols. Quagga supports the BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng protocols, and is intended to be used as a Route Server and Route Reflector.
Security Fix(es):
- quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code (CVE-2018-5379)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank the Quagga project for reporting this issue.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the bgpd daemon must be restarted for the update to take effect.
- Package List:
Red Hat Enterprise Linux Server (v. 7):
Source: quagga-0.99.22.4-5.el7_4.src.rpm
ppc64: quagga-0.99.22.4-5.el7_4.ppc.rpm quagga-0.99.22.4-5.el7_4.ppc64.rpm quagga-debuginfo-0.99.22.4-5.el7_4.ppc.rpm quagga-debuginfo-0.99.22.4-5.el7_4.ppc64.rpm
ppc64le: quagga-0.99.22.4-5.el7_4.ppc64le.rpm quagga-debuginfo-0.99.22.4-5.el7_4.ppc64le.rpm
s390x: quagga-0.99.22.4-5.el7_4.s390.rpm quagga-0.99.22.4-5.el7_4.s390x.rpm quagga-debuginfo-0.99.22.4-5.el7_4.s390.rpm quagga-debuginfo-0.99.22.4-5.el7_4.s390x.rpm
x86_64: quagga-0.99.22.4-5.el7_4.i686.rpm quagga-0.99.22.4-5.el7_4.x86_64.rpm quagga-debuginfo-0.99.22.4-5.el7_4.i686.rpm quagga-debuginfo-0.99.22.4-5.el7_4.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source: quagga-0.99.22.4-5.el7_4.src.rpm
aarch64: quagga-0.99.22.4-5.el7_4.aarch64.rpm quagga-debuginfo-0.99.22.4-5.el7_4.aarch64.rpm
ppc64le: quagga-0.99.22.4-5.el7_4.ppc64le.rpm quagga-debuginfo-0.99.22.4-5.el7_4.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: quagga-contrib-0.99.22.4-5.el7_4.ppc64.rpm quagga-debuginfo-0.99.22.4-5.el7_4.ppc.rpm quagga-debuginfo-0.99.22.4-5.el7_4.ppc64.rpm quagga-devel-0.99.22.4-5.el7_4.ppc.rpm quagga-devel-0.99.22.4-5.el7_4.ppc64.rpm
ppc64le: quagga-contrib-0.99.22.4-5.el7_4.ppc64le.rpm quagga-debuginfo-0.99.22.4-5.el7_4.ppc64le.rpm quagga-devel-0.99.22.4-5.el7_4.ppc64le.rpm
s390x: quagga-contrib-0.99.22.4-5.el7_4.s390x.rpm quagga-debuginfo-0.99.22.4-5.el7_4.s390.rpm quagga-debuginfo-0.99.22.4-5.el7_4.s390x.rpm quagga-devel-0.99.22.4-5.el7_4.s390.rpm quagga-devel-0.99.22.4-5.el7_4.s390x.rpm
x86_64: quagga-contrib-0.99.22.4-5.el7_4.x86_64.rpm quagga-debuginfo-0.99.22.4-5.el7_4.i686.rpm quagga-debuginfo-0.99.22.4-5.el7_4.x86_64.rpm quagga-devel-0.99.22.4-5.el7_4.i686.rpm quagga-devel-0.99.22.4-5.el7_4.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64: quagga-contrib-0.99.22.4-5.el7_4.aarch64.rpm quagga-debuginfo-0.99.22.4-5.el7_4.aarch64.rpm quagga-devel-0.99.22.4-5.el7_4.aarch64.rpm
ppc64le: quagga-contrib-0.99.22.4-5.el7_4.ppc64le.rpm quagga-debuginfo-0.99.22.4-5.el7_4.ppc64le.rpm quagga-devel-0.99.22.4-5.el7_4.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: quagga-0.99.22.4-5.el7_4.src.rpm
x86_64: quagga-0.99.22.4-5.el7_4.i686.rpm quagga-0.99.22.4-5.el7_4.x86_64.rpm quagga-debuginfo-0.99.22.4-5.el7_4.i686.rpm quagga-debuginfo-0.99.22.4-5.el7_4.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: quagga-contrib-0.99.22.4-5.el7_4.x86_64.rpm quagga-debuginfo-0.99.22.4-5.el7_4.i686.rpm quagga-debuginfo-0.99.22.4-5.el7_4.x86_64.rpm quagga-devel-0.99.22.4-5.el7_4.i686.rpm quagga-devel-0.99.22.4-5.el7_4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2018-5379 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFalvS5XlSAg2UNWIIRAt2VAJoDHq+b03wv2cXdpBivxT/zOAniAQCgkE2/ WD9+DkKEg1eZpmyT0FyyN8s= =NOHT -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201804-17
https://security.gentoo.org/
Severity: High Title: Quagga: Multiple vulnerabilities Date: April 22, 2018 Bugs: #647788 ID: 201804-17
Synopsis
Multiple vulnerabilities have been found in Quagga, the worst of which could allow remote attackers to execute arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/quagga < 1.2.4 >= 1.2.4
Description
Multiple vulnerabilities have been discovered in Quagga. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Quagga users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/quagga-1.2.4"
References
[ 1 ] CVE-2018-5378 https://nvd.nist.gov/vuln/detail/CVE-2018-5378 [ 2 ] CVE-2018-5379 https://nvd.nist.gov/vuln/detail/CVE-2018-5379 [ 3 ] CVE-2018-5380 https://nvd.nist.gov/vuln/detail/CVE-2018-5380 [ 4 ] CVE-2018-5381 https://nvd.nist.gov/vuln/detail/CVE-2018-5381
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201804-17
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . ========================================================================== Ubuntu Security Notice USN-3573-1 February 16, 2018
quagga vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Quagga. (CVE-2018-5379)
It was discovered that the Quagga BGP daemon did not properly bounds check the data sent with a NOTIFY to a peer. This issue only affected Ubuntu 17.10. (CVE-2018-5378)
It was discovered that a table overrun vulnerability existed in the Quagga BGP daemon. (CVE-2018-5380)
It was discovered that the Quagga BGP daemon in some configurations did not properly handle invalid OPEN messages. (CVE-2018-5381)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.10: quagga 1.1.1-3ubuntu0.2 quagga-bgpd 1.1.1-3ubuntu0.2
Ubuntu 16.04 LTS: quagga 0.99.24.1-2ubuntu1.4
Ubuntu 14.04 LTS: quagga 0.99.22.4-3ubuntu1.5
After a standard system update you need to restart Quagga to make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201802-1049", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "9.0" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "8.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.10" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.5" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "ruggedcom rox ii", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.13.0" }, { "model": "quagga", "scope": "lte", "trust": 1.0, "vendor": "quagga", "version": "1.2.2" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": "quagga", "scope": "lt", "trust": 0.8, "vendor": "quagga", "version": "1.2.3 earlier" }, { "model": "ruggedcom rox ii", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2.9" }, { "model": "ruggedcom rox ii", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2.12" }, { "model": "ruggedcom rox ii", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2.11" }, { "model": "ruggedcom rox ii", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2.10" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "1.2.2" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "1.2.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "1.2" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "1.1.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "1.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "1.0.20160309" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.24" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.22" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.21" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.17" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.16" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.15" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.14" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.13" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.12" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.11" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.10" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.9" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.8" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.7" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.6" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.5" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.4" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.3" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.2" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.98.6" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.98.5" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.98.3" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.98.2" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.98.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.98" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.97.5" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.97.3" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.97.2" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.97.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.97" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.96.5" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.96.3" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.96.2" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "1.0.20161017" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "1.0" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.24.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.22.3" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.22.2" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.22.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.20.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.20" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.19" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.99.18" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.98.4" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.97.4" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.96.4" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.96.1" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.96" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.95" }, { "model": "quagga", "scope": "eq", "trust": 0.3, "vendor": "quagga", "version": "0.93" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.3" }, { "model": "ruggedcom rox ii", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "2.13" }, { "model": "quagga", "scope": "ne", "trust": 0.3, "vendor": "quagga", "version": "1.2.3" } ], "sources": [ { "db": "CERT/CC", "id": "VU#940439" }, { "db": "BID", "id": "103105" }, { "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "db": "NVD", "id": "CVE-2018-5379" }, { "db": "CNNVD", "id": "CNNVD-201802-829" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.2.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.13.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-5379" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.,Siemens reported these vulnerabilities to NCCIC.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201802-829" } ], "trust": 0.6 }, "cve": "CVE-2018-5379", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2018-001492", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2018-5379", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "cret@cert.org", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.6, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2018-001492", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-5379", "trust": 1.0, "value": "CRITICAL" }, { "author": "cret@cert.org", "id": "CVE-2018-5379", "trust": 1.0, "value": "HIGH" }, { "author": "JPCERT/CC", "id": "JVNDB-2018-001492", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201802-829", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2018-5379", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-5379" }, { "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "db": "NVD", "id": "CVE-2018-5379" }, { "db": "NVD", "id": "CVE-2018-5379" }, { "db": "CNNVD", "id": "CNNVD-201802-829" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code. Quagga bgpd Contains several vulnerabilities: * Buffer overflow (CWE-119) - CVE-2018-5378 (Quagga-2018-0543) * Double memory release (CWE-415) - CVE-2018-5379 (Quagga-2018-1114) * Out of bounds read (CWE-125) - CVE-2018-5380 (Quagga-2018-1550) * Improper handling of incorrect syntactic constructs (CWE-228) - CVE-2018-5381 (Quagga-2018-1975) Detail is \u003ca href=\"https://savannah.nongnu.org/forum/forum.php?forum_id=9095\"target=\"blank\"\u003e Information provided by the developer \u003c/a\u003e Please refer to.The expected impact depends on each vulnerability, but remote code execution, information leakage, service operation interruption by a remote third party (DoS) An attack could be made. Quagga is prone to a remote code-execution vulnerability. Failed exploit attempts will likely cause a denial-of-service condition. \nVersions prior to Quagga 1.2.3 are vulnerable. \n A configured peer can take advantage of this flaw to cause a denial\n of service (bgpd daemon not responding to any other events; BGP\n sessions will drop and not be reestablished; unresponsive CLI\n interface). \n\n https://www.quagga.net/security/Quagga-2018-1975.txt\n\nFor the oldstable distribution (jessie), these problems have been fixed\nin version 0.99.23.1-1+deb8u5. \n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 1.1.1-3+deb9u2. \n\nWe recommend that you upgrade your quagga packages. \n\nFor the detailed security status of quagga please refer to its security\ntracker page at: https://security-tracker.debian.org/tracker/quagga\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\ndSpd32tzrxpDm86rvmRIiAJbj28n7QnX9I9BlKZqWq2fUUhTkNg=\n=Gy8j\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: quagga security update\nAdvisory ID: RHSA-2018:0377-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:0377\nIssue date: 2018-02-28\nCVE Names: CVE-2018-5379 \n=====================================================================\n\n1. Summary:\n\nAn update for quagga is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le\n\n3. Description:\n\nThe quagga packages contain Quagga, the free network-routing software suite\nthat manages TCP/IP based protocols. Quagga supports the BGP4, BGP4+,\nOSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng protocols, and is intended to be\nused as a Route Server and Route Reflector. \n\nSecurity Fix(es):\n\n* quagga: Double free vulnerability in bgpd when processing certain forms\nof UPDATE message allowing to crash or potentially execute arbitrary code\n(CVE-2018-5379)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nRed Hat would like to thank the Quagga project for reporting this issue. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the bgpd daemon must be restarted\nfor the update to take effect. \n\n5. Package List:\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nquagga-0.99.22.4-5.el7_4.src.rpm\n\nppc64:\nquagga-0.99.22.4-5.el7_4.ppc.rpm\nquagga-0.99.22.4-5.el7_4.ppc64.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.ppc.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.ppc64.rpm\n\nppc64le:\nquagga-0.99.22.4-5.el7_4.ppc64le.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.ppc64le.rpm\n\ns390x:\nquagga-0.99.22.4-5.el7_4.s390.rpm\nquagga-0.99.22.4-5.el7_4.s390x.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.s390.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.s390x.rpm\n\nx86_64:\nquagga-0.99.22.4-5.el7_4.i686.rpm\nquagga-0.99.22.4-5.el7_4.x86_64.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.i686.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.x86_64.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):\n\nSource:\nquagga-0.99.22.4-5.el7_4.src.rpm\n\naarch64:\nquagga-0.99.22.4-5.el7_4.aarch64.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.aarch64.rpm\n\nppc64le:\nquagga-0.99.22.4-5.el7_4.ppc64le.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.ppc64le.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nquagga-contrib-0.99.22.4-5.el7_4.ppc64.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.ppc.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.ppc64.rpm\nquagga-devel-0.99.22.4-5.el7_4.ppc.rpm\nquagga-devel-0.99.22.4-5.el7_4.ppc64.rpm\n\nppc64le:\nquagga-contrib-0.99.22.4-5.el7_4.ppc64le.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.ppc64le.rpm\nquagga-devel-0.99.22.4-5.el7_4.ppc64le.rpm\n\ns390x:\nquagga-contrib-0.99.22.4-5.el7_4.s390x.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.s390.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.s390x.rpm\nquagga-devel-0.99.22.4-5.el7_4.s390.rpm\nquagga-devel-0.99.22.4-5.el7_4.s390x.rpm\n\nx86_64:\nquagga-contrib-0.99.22.4-5.el7_4.x86_64.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.i686.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.x86_64.rpm\nquagga-devel-0.99.22.4-5.el7_4.i686.rpm\nquagga-devel-0.99.22.4-5.el7_4.x86_64.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):\n\naarch64:\nquagga-contrib-0.99.22.4-5.el7_4.aarch64.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.aarch64.rpm\nquagga-devel-0.99.22.4-5.el7_4.aarch64.rpm\n\nppc64le:\nquagga-contrib-0.99.22.4-5.el7_4.ppc64le.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.ppc64le.rpm\nquagga-devel-0.99.22.4-5.el7_4.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nquagga-0.99.22.4-5.el7_4.src.rpm\n\nx86_64:\nquagga-0.99.22.4-5.el7_4.i686.rpm\nquagga-0.99.22.4-5.el7_4.x86_64.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.i686.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nquagga-contrib-0.99.22.4-5.el7_4.x86_64.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.i686.rpm\nquagga-debuginfo-0.99.22.4-5.el7_4.x86_64.rpm\nquagga-devel-0.99.22.4-5.el7_4.i686.rpm\nquagga-devel-0.99.22.4-5.el7_4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-5379\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFalvS5XlSAg2UNWIIRAt2VAJoDHq+b03wv2cXdpBivxT/zOAniAQCgkE2/\nWD9+DkKEg1eZpmyT0FyyN8s=\n=NOHT\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201804-17\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Quagga: Multiple vulnerabilities\n Date: April 22, 2018\n Bugs: #647788\n ID: 201804-17\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Quagga, the worst of which\ncould allow remote attackers to execute arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/quagga \u003c 1.2.4 \u003e= 1.2.4 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Quagga. Please review\nthe CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Quagga users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/quagga-1.2.4\"\n\nReferences\n==========\n\n[ 1 ] CVE-2018-5378\n https://nvd.nist.gov/vuln/detail/CVE-2018-5378\n[ 2 ] CVE-2018-5379\n https://nvd.nist.gov/vuln/detail/CVE-2018-5379\n[ 3 ] CVE-2018-5380\n https://nvd.nist.gov/vuln/detail/CVE-2018-5380\n[ 4 ] CVE-2018-5381\n https://nvd.nist.gov/vuln/detail/CVE-2018-5381\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201804-17\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2018 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. ==========================================================================\nUbuntu Security Notice USN-3573-1\nFebruary 16, 2018\n\nquagga vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 17.10\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Quagga. (CVE-2018-5379)\n\nIt was discovered that the Quagga BGP daemon did not properly bounds\ncheck the data sent with a NOTIFY to a peer. \nThis issue only affected Ubuntu 17.10. (CVE-2018-5378)\n\nIt was discovered that a table overrun vulnerability existed in the\nQuagga BGP daemon. (CVE-2018-5380)\n\nIt was discovered that the Quagga BGP daemon in some configurations\ndid not properly handle invalid OPEN messages. (CVE-2018-5381)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 17.10:\n quagga 1.1.1-3ubuntu0.2\n quagga-bgpd 1.1.1-3ubuntu0.2\n\nUbuntu 16.04 LTS:\n quagga 0.99.24.1-2ubuntu1.4\n\nUbuntu 14.04 LTS:\n quagga 0.99.22.4-3ubuntu1.5\n\nAfter a standard system update you need to restart Quagga to make\nall the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2018-5379" }, { "db": "CERT/CC", "id": "VU#940439" }, { "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "db": "BID", "id": "103105" }, { "db": "VULMON", "id": "CVE-2018-5379" }, { "db": "PACKETSTORM", "id": "146416" }, { "db": "PACKETSTORM", "id": "146610" }, { "db": "PACKETSTORM", "id": "147305" }, { "db": "PACKETSTORM", "id": "146410" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#940439", "trust": 3.3 }, { "db": "NVD", "id": "CVE-2018-5379", "trust": 3.2 }, { "db": "BID", "id": "103105", "trust": 2.0 }, { "db": "ICS CERT", "id": "ICSA-19-099-05", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-451142", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95518305", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-001492", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2019.1207", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201802-829", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-5379", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146416", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146610", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147305", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146410", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#940439" }, { "db": "VULMON", "id": "CVE-2018-5379" }, { "db": "BID", "id": "103105" }, { "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "db": "PACKETSTORM", "id": "146416" }, { "db": "PACKETSTORM", "id": "146610" }, { "db": "PACKETSTORM", "id": "147305" }, { "db": "PACKETSTORM", "id": "146410" }, { "db": "NVD", "id": "CVE-2018-5379" }, { "db": "CNNVD", "id": "CNNVD-201802-829" } ] }, "id": "VAR-201802-1049", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.52540106 }, "last_update_date": "2023-12-18T12:29:10.855000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AXSA:2018-2582:01", "trust": 0.8, "url": "https://tsn.miraclelinux.com/ja/node/9025" }, { "title": "Quagga 1.2.3 Release, with significant BGP security fixes", "trust": 0.8, "url": "https://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "title": "\u4e0d\u6b63\u306a\u30e1\u30c3\u30bb\u30fc\u30b8\u306e\u53d7\u4fe1\u306b\u3088\u308aBGP\u6a5f\u80fd\u304c\u505c\u6b62\u3059\u308b\u8106\u5f31\u6027", "trust": 0.8, "url": "http://www.seil.jp/support/security/a01864.html" }, { "title": "Quagga BGP daemon Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=90582" }, { "title": "Red Hat: Important: quagga security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20180377 - security advisory" }, { "title": "Ubuntu Security Notice: quagga vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3573-1" }, { "title": "Red Hat: CVE-2018-5379", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2018-5379" }, { "title": "Debian Security Advisories: DSA-4115-1 quagga -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=60039c87d27a61271ac8cea042fa360d" }, { "title": "Amazon Linux AMI: ALAS-2018-957", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2018-957" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=743274c8dcbded6c8c6a2fcbd1f712aa" }, { "title": "Debian CVElist Bug Report Logs: quagga: CVE-2018-5378 CVE-2018-5379 CVE-2018-5380 CVE-2018-5381", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=4da9cc5babf3128084a3957af98f57a1" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - January 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=f20bc19459353e30190c7e47d9da0c23" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=72fe5ebf222112c8481815fd7cefc7af" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-5379" }, { "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "db": "CNNVD", "id": "CNNVD-201802-829" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.8 }, { "problemtype": "CWE-119", "trust": 0.8 }, { "problemtype": "CWE-125", "trust": 0.8 }, { "problemtype": "CWE-228", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "db": "NVD", "id": "CVE-2018-5379" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.kb.cert.org/vuls/id/940439" }, { "trust": 2.5, "url": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "trust": 2.5, "url": "https://www.debian.org/security/2018/dsa-4115" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/103105" }, { "trust": 2.0, "url": "https://gogs.quagga.net/quagga/quagga/src/master/doc/security/quagga-2018-1114.txt" }, { "trust": 1.9, "url": "https://access.redhat.com/errata/rhsa-2018:0377" }, { "trust": 1.8, "url": "https://usn.ubuntu.com/3573-1/" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201804-17" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5379" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5378" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5380" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5381" }, { "trust": 1.0, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-099-05" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2018-5379" }, { "trust": 0.9, "url": "http://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542985" }, { "trust": 0.9, "url": "https://www.oracle.com/technetwork/topics/security/bulletinapr2018-4443185.html" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/228.html" }, { "trust": 0.8, "url": "http://lists.suse.com/pipermail/sle-security-updates/2018-february/003735.html" }, { "trust": 0.8, "url": "https://usn.ubuntu.com/usn/usn-3573-1/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5381" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5378" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5379" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5380" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-099-05" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95518305/index.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78746" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=57162" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.quagga.net/security/quagga-2018-0543.txt" }, { "trust": 0.1, "url": "https://www.quagga.net/security/quagga-2018-1975.txt" }, { "trust": 0.1, "url": "https://www.quagga.net/security/quagga-2018-1550.txt" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.quagga.net/security/quagga-2018-1114.txt" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/quagga" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/quagga/1.1.1-3ubuntu0.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/quagga/0.99.22.4-3ubuntu1.5" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3573-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/quagga/0.99.24.1-2ubuntu1.4" } ], "sources": [ { "db": "CERT/CC", "id": "VU#940439" }, { "db": "VULMON", "id": "CVE-2018-5379" }, { "db": "BID", "id": "103105" }, { "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "db": "PACKETSTORM", "id": "146416" }, { "db": "PACKETSTORM", "id": "146610" }, { "db": "PACKETSTORM", "id": "147305" }, { "db": "PACKETSTORM", "id": "146410" }, { "db": "NVD", "id": "CVE-2018-5379" }, { "db": "CNNVD", "id": "CNNVD-201802-829" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#940439" }, { "db": "VULMON", "id": "CVE-2018-5379" }, { "db": "BID", "id": "103105" }, { "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "db": "PACKETSTORM", "id": "146416" }, { "db": "PACKETSTORM", "id": "146610" }, { "db": "PACKETSTORM", "id": "147305" }, { "db": "PACKETSTORM", "id": "146410" }, { "db": "NVD", "id": "CVE-2018-5379" }, { "db": "CNNVD", "id": "CNNVD-201802-829" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-02-15T00:00:00", "db": "CERT/CC", "id": "VU#940439" }, { "date": "2018-02-19T00:00:00", "db": "VULMON", "id": "CVE-2018-5379" }, { "date": "2018-02-15T00:00:00", "db": "BID", "id": "103105" }, { "date": "2018-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "date": "2018-02-16T14:36:28", "db": "PACKETSTORM", "id": "146416" }, { "date": "2018-02-28T23:24:22", "db": "PACKETSTORM", "id": "146610" }, { "date": "2018-04-23T20:02:00", "db": "PACKETSTORM", "id": "147305" }, { "date": "2018-02-15T23:25:00", "db": "PACKETSTORM", "id": "146410" }, { "date": "2018-02-19T13:29:00.413000", "db": "NVD", "id": "CVE-2018-5379" }, { "date": "2018-02-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201802-829" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-02-19T00:00:00", "db": "CERT/CC", "id": "VU#940439" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2018-5379" }, { "date": "2019-04-10T11:00:00", "db": "BID", "id": "103105" }, { "date": "2019-07-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-001492" }, { "date": "2019-10-09T23:41:15.437000", "db": "NVD", "id": "CVE-2018-5379" }, { "date": "2019-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201802-829" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "147305" }, { "db": "PACKETSTORM", "id": "146410" }, { "db": "CNNVD", "id": "CNNVD-201802-829" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Quagga bgpd is affected by multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#940439" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201802-829" } ], "trust": 0.6 } }
rhsa-2018:0377
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for quagga is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The quagga packages contain Quagga, the free network-routing software suite that manages TCP/IP based protocols. Quagga supports the BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng protocols, and is intended to be used as a Route Server and Route Reflector.\n\nSecurity Fix(es):\n\n* quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code (CVE-2018-5379)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Quagga project for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0377", "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1542985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542985" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0377.json" } ], "title": "Red Hat Security Advisory: quagga security update", "tracking": { "current_release_date": "2024-11-22T11:46:42+00:00", "generator": { "date": "2024-11-22T11:46:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0377", "initial_release_date": "2018-02-28T18:30:59+00:00", "revision_history": [ { "date": "2018-02-28T18:30:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-02-28T18:30:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:46:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.i686", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.i686", "product_id": "quagga-0:0.99.22.4-5.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=i686" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=i686" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.src", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.src", "product_id": "quagga-0:0.99.22.4-5.el7_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.ppc", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc", "product_id": "quagga-0:0.99.22.4-5.el7_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=ppc" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=ppc" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=ppc64le" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=ppc64le" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=ppc64le" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.s390", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.s390", "product_id": "quagga-0:0.99.22.4-5.el7_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=s390" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=s390" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=s390x" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=s390x" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=s390x" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=aarch64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=aarch64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=aarch64" } } }, { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Quagga project" ] } ], "cve": "CVE-2018-5379", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1542985" } ], "notes": [ { "category": "description", "text": "A double-free vulnerability was found in Quagga. A BGP peer could send a specially crafted UPDATE message which would cause allocated blocks of memory to be free()d more than once, potentially leading to a crash or other issues.", "title": "Vulnerability description" }, { "category": "summary", "text": "quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code", "title": "Vulnerability summary" }, { "category": "other", "text": "Glibc\u0027s heap protection mitigations render this issue more difficult to exploit, though bypasses may still be possible.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5379" }, { "category": "external", "summary": "RHBZ#1542985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542985" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5379", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5379" }, { "category": "external", "summary": "https://www.quagga.net/security/Quagga-2018-1114.txt", "url": "https://www.quagga.net/security/Quagga-2018-1114.txt" } ], "release_date": "2018-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-02-28T18:30:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the bgpd daemon must be restarted for the update to take effect.", "product_ids": [ "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0377" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code" } ] }
rhsa-2018_0377
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for quagga is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The quagga packages contain Quagga, the free network-routing software suite that manages TCP/IP based protocols. Quagga supports the BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng protocols, and is intended to be used as a Route Server and Route Reflector.\n\nSecurity Fix(es):\n\n* quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code (CVE-2018-5379)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Quagga project for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0377", "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1542985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542985" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0377.json" } ], "title": "Red Hat Security Advisory: quagga security update", "tracking": { "current_release_date": "2024-11-22T11:46:42+00:00", "generator": { "date": "2024-11-22T11:46:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0377", "initial_release_date": "2018-02-28T18:30:59+00:00", "revision_history": [ { "date": "2018-02-28T18:30:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-02-28T18:30:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:46:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.i686", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.i686", "product_id": "quagga-0:0.99.22.4-5.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=i686" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=i686" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.src", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.src", "product_id": "quagga-0:0.99.22.4-5.el7_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.ppc", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc", "product_id": "quagga-0:0.99.22.4-5.el7_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=ppc" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=ppc" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=ppc64le" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=ppc64le" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=ppc64le" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.s390", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.s390", "product_id": "quagga-0:0.99.22.4-5.el7_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=s390" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=s390" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=s390x" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=s390x" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=s390x" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=aarch64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=aarch64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=aarch64" } } }, { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Quagga project" ] } ], "cve": "CVE-2018-5379", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1542985" } ], "notes": [ { "category": "description", "text": "A double-free vulnerability was found in Quagga. A BGP peer could send a specially crafted UPDATE message which would cause allocated blocks of memory to be free()d more than once, potentially leading to a crash or other issues.", "title": "Vulnerability description" }, { "category": "summary", "text": "quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code", "title": "Vulnerability summary" }, { "category": "other", "text": "Glibc\u0027s heap protection mitigations render this issue more difficult to exploit, though bypasses may still be possible.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5379" }, { "category": "external", "summary": "RHBZ#1542985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542985" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5379", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5379" }, { "category": "external", "summary": "https://www.quagga.net/security/Quagga-2018-1114.txt", "url": "https://www.quagga.net/security/Quagga-2018-1114.txt" } ], "release_date": "2018-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-02-28T18:30:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the bgpd daemon must be restarted for the update to take effect.", "product_ids": [ "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0377" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code" } ] }
RHSA-2018:0377
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for quagga is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The quagga packages contain Quagga, the free network-routing software suite that manages TCP/IP based protocols. Quagga supports the BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng protocols, and is intended to be used as a Route Server and Route Reflector.\n\nSecurity Fix(es):\n\n* quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code (CVE-2018-5379)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the Quagga project for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0377", "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1542985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542985" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0377.json" } ], "title": "Red Hat Security Advisory: quagga security update", "tracking": { "current_release_date": "2024-11-22T11:46:42+00:00", "generator": { "date": "2024-11-22T11:46:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0377", "initial_release_date": "2018-02-28T18:30:59+00:00", "revision_history": [ { "date": "2018-02-28T18:30:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-02-28T18:30:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:46:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=x86_64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.i686", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.i686", "product_id": "quagga-0:0.99.22.4-5.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=i686" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=i686" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.src", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.src", "product_id": "quagga-0:0.99.22.4-5.el7_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.ppc", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc", "product_id": "quagga-0:0.99.22.4-5.el7_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=ppc" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=ppc" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=ppc64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=ppc64le" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=ppc64le" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=ppc64le" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.s390", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.s390", "product_id": "quagga-0:0.99.22.4-5.el7_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=s390" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=s390" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=s390x" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=s390x" } } }, { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=s390x" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-devel@0.99.22.4-5.el7_4?arch=aarch64" } } }, { "category": "product_version", "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-contrib@0.99.22.4-5.el7_4?arch=aarch64" } } }, { "category": "product_version", "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga-debuginfo@0.99.22.4-5.el7_4?arch=aarch64" } } }, { "category": "product_version", "name": "quagga-0:0.99.22.4-5.el7_4.aarch64", "product": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64", "product_id": "quagga-0:0.99.22.4-5.el7_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/quagga@0.99.22.4-5.el7_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.src", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.i686", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" }, "product_reference": "quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Quagga project" ] } ], "cve": "CVE-2018-5379", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1542985" } ], "notes": [ { "category": "description", "text": "A double-free vulnerability was found in Quagga. A BGP peer could send a specially crafted UPDATE message which would cause allocated blocks of memory to be free()d more than once, potentially leading to a crash or other issues.", "title": "Vulnerability description" }, { "category": "summary", "text": "quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code", "title": "Vulnerability summary" }, { "category": "other", "text": "Glibc\u0027s heap protection mitigations render this issue more difficult to exploit, though bypasses may still be possible.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5379" }, { "category": "external", "summary": "RHBZ#1542985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542985" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5379", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5379" }, { "category": "external", "summary": "https://www.quagga.net/security/Quagga-2018-1114.txt", "url": "https://www.quagga.net/security/Quagga-2018-1114.txt" } ], "release_date": "2018-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-02-28T18:30:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the bgpd daemon must be restarted for the update to take effect.", "product_ids": [ "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0377" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-Alt-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-Alt-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.src", "7Server-optional-Alt-7.4.z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Server-optional-Alt-7.4.z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.src", "7Workstation-optional-7.4.Z:quagga-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-contrib-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-debuginfo-0:0.99.22.4-5.el7_4.x86_64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.aarch64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.i686", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.ppc64le", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.s390x", "7Workstation-optional-7.4.Z:quagga-devel-0:0.99.22.4-5.el7_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code" } ] }
cve-2018-5379
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
quagga | quagga | * | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.4 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_workstation | 7.0 | |
siemens | ruggedcom_rox_ii_firmware | * | |
siemens | ruggedcom_rox_ii | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*", "matchCriteriaId": "5117934B-9B41-4ECF-807D-252F6CA1CF97", "versionEndIncluding": "1.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBDC4817-0B21-45A9-A384-AECE46E2EBC2", "versionEndExcluding": "2.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA04F52-40D0-4A4B-9767-265A26EFD98D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code." }, { "lang": "es", "value": "El demonio Quagga BGP (bgpd), en versiones anteriores a la 1.2.3, puede realizar una doble liberaci\u00f3n (double free) de memoria al procesar ciertos formularios de un mensaje UPDATE que contienen atributos cluster-list y/o desconocidos. Un ataque con \u00e9xito podr\u00eda provocar una denegaci\u00f3n de servicio (DoS) o permitir que un atacante ejecute c\u00f3digo arbitrario." } ], "id": "CVE-2018-5379", "lastModified": "2024-11-21T04:08:41.997", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "cret@cert.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-19T13:29:00.413", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/940439" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103105" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201804-17" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3573-1/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/940439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201804-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3573-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4115" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-5prq-47x2-38gv
Vulnerability from github
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
{ "affected": [], "aliases": [ "CVE-2018-5379" ], "database_specific": { "cwe_ids": [ "CWE-415" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-02-19T13:29:00Z", "severity": "CRITICAL" }, "details": "The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.", "id": "GHSA-5prq-47x2-38gv", "modified": "2022-05-13T01:32:12Z", "published": "2022-05-13T01:32:12Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5379" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf" }, { "type": "WEB", "url": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201804-17" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3573-1" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4115" }, { "type": "WEB", "url": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/940439" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103105" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2018-5379
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-5379", "description": "The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.", "id": "GSD-2018-5379", "references": [ "https://www.suse.com/security/cve/CVE-2018-5379.html", "https://www.debian.org/security/2018/dsa-4115", "https://access.redhat.com/errata/RHSA-2018:0377", "https://ubuntu.com/security/CVE-2018-5379", "https://advisories.mageia.org/CVE-2018-5379.html", "https://alas.aws.amazon.com/cve/html/CVE-2018-5379.html", "https://linux.oracle.com/cve/CVE-2018-5379.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-5379" ], "details": "The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.", "id": "GSD-2018-5379", "modified": "2023-12-13T01:22:40.107801Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "DATE_PUBLIC": "2018-02-15T00:00:00.000Z", "ID": "CVE-2018-5379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "bgpd", "version": { "version_data": [ { "affected": "\u003c", "version_name": "bpgd", "version_value": "1.2.3" } ] } } ] }, "vendor_name": "Quagga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-415: Double Free" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3573-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3573-1/" }, { "name": "DSA-4115", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4115" }, { "name": "103105", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103105" }, { "name": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095", "refsource": "CONFIRM", "url": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "name": "GLSA-201804-17", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201804-17" }, { "name": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt", "refsource": "CONFIRM", "url": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt" }, { "name": "[debian-lts-announce] 20180216 [SECURITY] [DLA 1286-1] quagga security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html" }, { "name": "VU#940439", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/940439" }, { "name": "RHSA-2018:0377", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf" } ] }, "source": { "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.2.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.13.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2018-5379" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-415" } ] } ] }, "references": { "reference_data": [ { "name": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt" }, { "name": "VU#940439", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/940439" }, { "name": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://savannah.nongnu.org/forum/forum.php?forum_id=9095" }, { "name": "DSA-4115", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4115" }, { "name": "[debian-lts-announce] 20180216 [SECURITY] [DLA 1286-1] quagga security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html" }, { "name": "103105", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103105" }, { "name": "RHSA-2018:0377", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0377" }, { "name": "USN-3573-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3573-1/" }, { "name": "GLSA-201804-17", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201804-17" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-09T23:41Z", "publishedDate": "2018-02-19T13:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.