Go to file
Ondřej Lysoněk ba3a7a25ca Fix CVE-2018-5379, CVE-2018-5380, CVE-2018-5381, CVE-2018-5378
Fixed CVE-2018-5379 - Double free vulnerability in bgpd when processing
  certain forms of UPDATE message allowing to crash or potentially execute
  arbitrary code
Resolves: rhbz#1546008

Fixed CVE-2018-5380 - bgpd can overrun internal BGP code-to-string
  conversion tables potentially allowing crash
Resolves: rhbz#1546006

Fixed CVE-2018-5381 - Infinite loop issue triggered by invalid OPEN message
  allows denial-of-service
Resolves: rhbz#1546004

Fixed CVE-2018-5378 - bgpd does not properly bounds check the data sent with
  a NOTIFY allowing leak of sensitive data or crash
Resolves: rhbz#1546009
2018-02-22 11:59:51 +01:00
.gitignore
0001-bgpd-security-debug-print-of-received-NOTIFY-data-ca.patch
0001-bgpd-security-Fix-double-free-of-unknown-attribute.patch
0001-bgpd-security-fix-infinite-loop-on-certain-invalid-O.patch
0001-bgpd-security-invalid-attr-length-sends-NOTIFY-with-.patch
quagga-filter-perl-requires.sh
quagga-tmpfs.conf
quagga.spec
sources