[SECURITY] Fedora 38 Update: frr-8.5.3-1.fc38

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-61abba57d8
2023-11-15 02:14:31.347624
--------------------------------------------------------------------------------

Name        : frr
Product     : Fedora 38
Version     : 8.5.3
Release     : 1.fc38
URL         : http://www.frrouting.org
Summary     : Routing daemon
Description :
FRRouting is free software that manages TCP/IP based routing protocols. It takes
a multi-server and multi-threaded approach to resolve the current complexity
of the Internet.

FRRouting supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD.

FRRouting is a fork of Quagga.

--------------------------------------------------------------------------------
Update Information:

New version 8.5.3.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct 10 2023 Michal Ruprich <mruprich@xxxxxxxxxx> - 8.5.3-1
- New version 8.5.3
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2230983 - CVE-2023-38802 frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router
        https://bugzilla.redhat.com/show_bug.cgi?id=2230983
  [ 2 ] Bug #2235839 - CVE-2023-41358 frr: processes invalid NLRIs if attribute length is zero
        https://bugzilla.redhat.com/show_bug.cgi?id=2235839
  [ 3 ] Bug #2235840 - CVE-2023-41359 frr: out of bounds read in bgp_attr_aigp_valid
        https://bugzilla.redhat.com/show_bug.cgi?id=2235840
  [ 4 ] Bug #2235842 - CVE-2023-41360 frr: ahead-of-stream read of ORF header
        https://bugzilla.redhat.com/show_bug.cgi?id=2235842
  [ 5 ] Bug #2237416 - CVE-2023-41909 frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c
        https://bugzilla.redhat.com/show_bug.cgi?id=2237416
  [ 6 ] Bug #2238990 - CVE-2023-31489 frr: incorrect length check in bgp_capability_llgr() can lead do DoS
        https://bugzilla.redhat.com/show_bug.cgi?id=2238990
  [ 7 ] Bug #2238992 - CVE-2023-31490 frr: missing length check in bgp_attr_psid_sub() can lead do DoS
        https://bugzilla.redhat.com/show_bug.cgi?id=2238992
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-61abba57d8' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Index of Archives]     [Fedora Users]     [Fedora Legacy]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Photos]     [KDE Users]

  Powered by Linux