File _patchinfo of Package patchinfo.23257

<patchinfo incident="23257">
  <issue tracker="bnc" id="1196506">VUL-0: CVE-2022-26126: frr: Misusing strdup leads to stack overflow in isis_nb_notifications.c</issue>
  <issue tracker="bnc" id="1180217">frr got stuck during build and IBS killed it</issue>
  <issue tracker="bnc" id="1196507">VUL-0: CVE-2022-26128: frr: Heap buffer overflow in function babel_packet_examin in babeld/message.c</issue>
  <issue tracker="bnc" id="1196503">VUL-0: CVE-2022-26127: frr: frrouting: Heap buffer overflow in frr/babeld/message.c</issue>
  <issue tracker="bnc" id="1196505">VUL-0: CVE-2022-26125: frr: overflow bugs in unpack_tlv_router_cap</issue>
  <issue tracker="bnc" id="1196504">VUL-0: CVE-2022-26129: frr: frrouting: Buffer overflow in functions parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c</issue>
  <issue tracker="cve" id="2022-26126"/>
  <issue tracker="cve" id="2022-26127"/>
  <issue tracker="cve" id="2022-26128"/>
  <issue tracker="cve" id="2022-26125"/>
  <issue tracker="cve" id="2022-26129"/>
  <packager>mtomaschewski</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for frr</summary>
  <description>This update for frr fixes the following issues:

- CVE-2022-26125, CVE-2022-26126: Fixed buffer overflows in unpack_tlv_router_cap() (bsc#1196505, bsc#1196506).
- CVE-2022-26127: Fixed heap buffer overflow in babel_packet_examin() (bsc#1196503).
- CVE-2022-26128: Fixed buffer overflows in babel_packet_examin() (bsc#1196507).
- CVE-2022-26129: Fixed buffer overflows in parse_hello_subtlv(), parse_ihu_subtlv() and parse_update_subtlv() (bsc#1196504).
</description>
</patchinfo>
openSUSE Build Service is sponsored by