diff options
author | Jonas Gorski <jonas.gorski@bisdn.de> | 2023-05-10 12:37:38 +0200 |
---|---|---|
committer | Armin Kuster <akuster808@gmail.com> | 2023-05-24 10:47:53 -0400 |
commit | 36707815060e387c2370962b5eb21bac7750f924 (patch) | |
tree | 901ef4498f05616ca77e4af1b8368023f346e108 /meta-python/recipes-devtools/python/python3-sqlparse/run-ptest | |
parent | 16718c0a0eb1593154451b6f1edc8ac66d5d21a9 (diff) | |
download | meta-openembedded-36707815060e387c2370962b5eb21bac7750f924.tar.gz |
frr: Security fix CVE-2022-43681
Add a security fix cherry-picked from master:
CVE-2022-40318:
An out-of-bounds read exists in the BGP daemon of FRRouting FRR through
8.4. When sending a malformed BGP OPEN message that ends with the option
length octet (or the option length word, in case of an extended OPEN
message), the FRR code reads of out of the bounds of the packet,
throwing a SIGABRT signal and exiting. This results in a bgpd daemon
restart, causing a Denial-of-Service condition.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-43681
https://cyberriskleaders.com/new-vulnerabilities-disclosed-in-frrouting-software/
Patch from:
https://github.com/FRRouting/frr/commit/766eec1b7accffe2c04a5c9ebb14e9f487bb9f78
Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-sqlparse/run-ptest')
0 files changed, 0 insertions, 0 deletions