summaryrefslogtreecommitdiffstats
path: root/support/scripts
diff options
context:
space:
mode:
authorPeter Korsgaard <peter@korsgaard.com>2018-02-19 16:50:59 +0100
committerPeter Korsgaard <peter@korsgaard.com>2018-02-19 23:48:35 +0100
commit157a198d304224c12fa0d91d977a6619d021f5c6 (patch)
tree304d0f60c9f35127c468b78d2ae24467ab14949b /support/scripts
parent737278c2ccb607c4a5a8b3bb0d817c25a2dc2602 (diff)
downloadbuildroot-157a198d304224c12fa0d91d977a6619d021f5c6.tar.gz
buildroot-157a198d304224c12fa0d91d977a6619d021f5c6.zip
quagga: add upstream security fixes
Fixes the following security issues: CVE-2018-5378 It was discovered that the Quagga BGP daemon, bgpd, does not properly bounds check data sent with a NOTIFY to a peer, if an attribute length is invalid. A configured BGP peer can take advantage of this bug to read memory from the bgpd process or cause a denial of service (daemon crash). https://www.quagga.net/security/Quagga-2018-0543.txt CVE-2018-5379 It was discovered that the Quagga BGP daemon, bgpd, can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes, resulting in a denial of service (bgpd daemon crash). https://www.quagga.net/security/Quagga-2018-1114.txt CVE-2018-5380 It was discovered that the Quagga BGP daemon, bgpd, does not properly handle internal BGP code-to-string conversion tables. https://www.quagga.net/security/Quagga-2018-1550.txt CVE-2018-5381 It was discovered that the Quagga BGP daemon, bgpd, can enter an infinite loop if sent an invalid OPEN message by a configured peer. A configured peer can take advantage of this flaw to cause a denial of service (bgpd daemon not responding to any other events; BGP sessions will drop and not be reestablished; unresponsive CLI interface). https://www.quagga.net/security/Quagga-2018-1975.txt Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'support/scripts')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud