File _patchinfo of Package patchinfo.35810

<patchinfo incident="35810">
  <issue tracker="cve" id="2017-15865"/>
  <issue tracker="cve" id="2024-44070"/>
  <issue tracker="cve" id="2022-37032"/>
  <issue tracker="bnc" id="1230866">VUL-0: CVE-2017-15865: frr,quagga: sensitive information disclosure when processing malformed BGP UPDATE packets from a connected peer</issue>
  <issue tracker="bnc" id="1229438">VUL-0: CVE-2024-44070: frr,quagga: remaining stream length is not checked before the TLV value is taken in bgp_attr_encap</issue>
  <issue tracker="bnc" id="1202023">VUL-0: CVE-2022-37032: frr: out-of-bounds read in the BGP daemon may lead to information disclosure or denial of service</issue>
  <packager>mtomaschewski</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for quagga</summary>
  <description>This update for quagga fixes the following issues:

- CVE-2017-15865: sensitive information disclosed when malformed BGP UPDATE packets are processed. (bsc#1230866)
- CVE-2024-44070: crash when parsing Tunnel Encap attribute due to no length check. (bsc#1229438)
- CVE-2022-37032: out-of-bounds read when parsing a BGP capability message due to incorrect size check. (bsc#1202023)
</description>
</patchinfo>
openSUSE Build Service is sponsored by