Back to bug 2196088
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Sandipan Roy | 2023-05-08 04:10:10 UTC | Blocks | 2193421 | |
| Sandipan Roy | 2023-05-08 04:18:49 UTC | Doc Text | A vulnerability was found in FRRouting. An out-of-bounds read exists in the BGP daemon of FRRouting, When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition. | |
| Sandipan Roy | 2023-05-08 04:23:34 UTC | Depends On | 2196093, 2196094 | |
| RaTasha Tillery-Smith | 2023-05-08 12:59:02 UTC | Doc Text | A vulnerability was found in FRRouting. An out-of-bounds read exists in the BGP daemon of FRRouting, When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition. | An out-of-bounds read flaw exists in the BGP daemon of FRRouting. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads out of the bounds of the packet, throwing a SIGABRT signal and exiting. This issue results in a bgpd daemon restart, causing a denial of service. |
| FrantiĊĦek Hrdina | 2023-05-10 06:37:42 UTC | CC | fhrdina | |
| Sandipan Roy | 2023-05-10 09:07:00 UTC | Depends On | 2196093 | |
| Sandipan Roy | 2023-05-10 09:07:47 UTC | Depends On | 2196794 | |
| Red Hat Bugzilla | 2023-07-07 08:29:50 UTC | Assignee | security-response-team | nobody |
Back to bug 2196088