File _patchinfo of Package patchinfo.34170
<patchinfo incident="34170">
<issue tracker="cve" id="2024-31950"/>
<issue tracker="cve" id="2024-34088"/>
<issue tracker="cve" id="2024-31951"/>
<issue tracker="bnc" id="1223786">VUL-0: CVE-2024-34088: frr,quagga: frr: null pointer via get_edge() function can trigger a denial of service</issue>
<issue tracker="bnc" id="1222528">VUL-0: CVE-2024-31951: frr,quagga: buffer overflow in ospf_te_parse_ext_link</issue>
<issue tracker="bnc" id="1222526">VUL-0: CVE-2024-31950: frr,quagga: buffer overflow and daemon crash in ospf_te_parse_ri</issue>
<packager>mtomaschewski</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for frr</summary>
<description>This update for frr fixes the following issues:
- CVE-2024-34088: Fixed null pointer via get_edge() function can trigger a denial of service (bsc#1223786).
- CVE-2024-31951: Fixed buffer overflow in ospf_te_parse_ext_link (bsc#1222528).
- CVE-2024-31950: Fixed buffer overflow and daemon crash in ospf_te_parse_ri (bsc#1222526).
</description>
</patchinfo>