FRRouting Routing daemon
FRR is free software which manages TCP/IP based routing protocols.
It supports BGP4, BGP4+, OSPFv2, OSPFv3, IS-IS, RIPv1, RIPv2, RIPng,
PIM and LDP as well as the IPv6 versions of these.
FRR is a fork of Quagga..
- Links to network / frr
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:mtomaschewski:frr/frr && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
0015-bgpd-Treat-EOR-as-withdrawn-to-avoid-unwanted |
0000003736 3.65 KB | |
0016-bgpd-Ignore-handling-NLRIs-if-we-received-MP_ |
0000003635 3.55 KB | |
0017-bgpd-Fix-use-beyond-end-of-stream-of-labeled- |
0000001967 1.92 KB | |
0018-bgpd-Flowspec-overflow-issue.patch | 0000001282 1.25 KB | |
_link | 0000000148 148 Bytes | |
project.diff | 0000002569 2.51 KB |
Revision 10 (latest revision is 18)
Marius Tomaschewski (mtomaschewski)
committed
(revision 10)
- Apply upstream fix for a crash on malformed BGP UPDATE message with an EOR, because the presence of EOR does not lead to a treat-as-withdraw outcome (CVE-2023-47235,1216896,https://github.com/FRRouting/frr/pull/14716/commits/6814f2e0138a6ea5e1f83bdd9085d9a77999900b) [+ 0015-bgpd-Treat-EOR-as-withdrawn-to-avoid-unwanted-handli.patch] - Apply upstream fix for a crash on crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (CVE-2023-47234, bsc#1216897,ttps://github.com/FRRouting/frr/pull/14716/commits/c37119df45bbf4ef713bc10475af2ee06e12f3bf) [+ 0016-bgpd-Ignore-handling-NLRIs-if-we-received-MP_UNREACH.patch] - Apply upstream fix for attempts to read beyond the end of the stream during labeled unicast parsing (CVE-2023-38407,bsc#1216899,https://github.com/FRRouting/frr/pull/12956/commits/ab362eae68edec12c175d9bc488bcc3f8b73d36f) [+ 0017-bgpd-Fix-use-beyond-end-of-stream-of-labeled-unicast.patch] - Apply upstream fix for an nlri length of zero mishandling, aka "flowspec overflow" (CVE-2023-38406,bsc#1216900,https://github.com/FRRouting/frr/pull/12884/commits/0b999c886e241c52bd1f7ef0066700e4b618ebb3) [+ 0018-bgpd-Flowspec-overflow-issue.patch]
Comments 0