File _patchinfo of Package patchinfo.23257
<patchinfo incident="23257">
<issue tracker="bnc" id="1196506">VUL-0: CVE-2022-26126: frr: Misusing strdup leads to stack overflow in isis_nb_notifications.c</issue>
<issue tracker="bnc" id="1180217">frr got stuck during build and IBS killed it</issue>
<issue tracker="bnc" id="1196507">VUL-0: CVE-2022-26128: frr: Heap buffer overflow in function babel_packet_examin in babeld/message.c</issue>
<issue tracker="bnc" id="1196503">VUL-0: CVE-2022-26127: frr: frrouting: Heap buffer overflow in frr/babeld/message.c</issue>
<issue tracker="bnc" id="1196505">VUL-0: CVE-2022-26125: frr: overflow bugs in unpack_tlv_router_cap</issue>
<issue tracker="bnc" id="1196504">VUL-0: CVE-2022-26129: frr: frrouting: Buffer overflow in functions parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c</issue>
<issue tracker="cve" id="2022-26126"/>
<issue tracker="cve" id="2022-26127"/>
<issue tracker="cve" id="2022-26128"/>
<issue tracker="cve" id="2022-26125"/>
<issue tracker="cve" id="2022-26129"/>
<packager>mtomaschewski</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for frr</summary>
<description>This update for frr fixes the following issues:
- CVE-2022-26125, CVE-2022-26126: Fixed buffer overflows in unpack_tlv_router_cap() (bsc#1196505, bsc#1196506).
- CVE-2022-26127: Fixed heap buffer overflow in babel_packet_examin() (bsc#1196503).
- CVE-2022-26128: Fixed buffer overflows in babel_packet_examin() (bsc#1196507).
- CVE-2022-26129: Fixed buffer overflows in parse_hello_subtlv(), parse_ihu_subtlv() and parse_update_subtlv() (bsc#1196504).
</description>
</patchinfo>