Back to bug 2058628
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2022-02-25 13:10:52 UTC | Comment | 0 | updated |
| Pedro Sampaio | 2022-02-25 13:12:18 UTC | Comment | 0 | updated |
| Pedro Sampaio | 2022-02-25 13:13:02 UTC | Priority | medium | high |
| Severity | medium | high | ||
| Pedro Sampaio | 2022-02-25 14:13:10 UTC | Severity | high | medium |
| Priority | high | medium | ||
| Pedro Sampaio | 2022-02-25 14:27:15 UTC | Blocks | 2058651 | |
| Pedro Sampaio | 2022-02-25 14:29:35 UTC | Alias | CVE-2022-26125 | |
| Summary | frrouting: overflow bugs in unpack_tlv_router_cap | CVE-2022-26125 frrouting: overflow bugs in unpack_tlv_router_cap | ||
| FrantiĊĦek Hrdina | 2022-04-06 11:53:47 UTC | Depends On | 2072473, 2072471, 2072472 | |
| CC | fhrdina | |||
| errata-xmlrpc | 2022-11-15 10:17:49 UTC | Fixed In Version | frrouting 8.2 | |
| Doc Text | frrouting is vulnerable to a flaw that can cause buffer overflow through 8.1.0 due to incorrect checks on the input packet length in isisd/isis_tlvs.c. There is high impact to availability due to the fact that the process up-time can be made | |||
| Doc Text | unreliable. | |||
| Doc Text | frrouting is vulnerable to a flaw that can cause buffer overflow through 8.1.0 due to incorrect checks on the input packet length in isisd/isis_tlvs.c. There is high impact to availability due to the fact that the process up-time can be made | frrouting is vulnerable to a flaw that can cause buffer overflow through due to incorrect checks on the input packet length when processing type-length-value packets. There is high impact to availability due to the fact that the process up-time can be | ||
| Doc Text | unreliable. | made unreliable. | ||
| Link ID | Red Hat Product Errata RHSA-2022:8112 | |||
| Product Security DevOps Team | 2022-12-04 20:22:57 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2022-12-04 20:22:57 UTC |
Back to bug 2058628