Back to bug 2196088

Who When What Removed Added
Sandipan Roy 2023-05-08 04:10:10 UTC Blocks 2193421
Sandipan Roy 2023-05-08 04:18:49 UTC Doc Text A vulnerability was found in FRRouting. An out-of-bounds read exists in the BGP daemon of FRRouting, When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition.
Sandipan Roy 2023-05-08 04:23:34 UTC Depends On 2196093, 2196094
RaTasha Tillery-Smith 2023-05-08 12:59:02 UTC Doc Text A vulnerability was found in FRRouting. An out-of-bounds read exists in the BGP daemon of FRRouting, When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition. An out-of-bounds read flaw exists in the BGP daemon of FRRouting. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads out of the bounds of the packet, throwing a SIGABRT signal and exiting. This issue results in a bgpd daemon restart, causing a denial of service.
FrantiĊĦek Hrdina 2023-05-10 06:37:42 UTC CC fhrdina
Sandipan Roy 2023-05-10 09:07:00 UTC Depends On 2196093
Sandipan Roy 2023-05-10 09:07:47 UTC Depends On 2196794
Red Hat Bugzilla 2023-07-07 08:29:50 UTC Assignee security-response-team nobody

Back to bug 2196088