VYPR

rpm package

suse/quagga&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP5

pkg:rpm/suse/quagga&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5

Vulnerabilities (9)

  • CVE-2024-44070Aug 19, 2024
    affected < 1.1.1-17.13.1fixed 1.1.1-17.13.1

    An issue was discovered in FRRouting (FRR) through 10.1. bgp_attr_encap in bgpd/bgp_attr.c does not check the actual remaining stream length before taking the TLV value.

  • CVE-2023-41358Aug 29, 2023
    affected < 1.1.1-17.10.1fixed 1.1.1-17.10.1

    An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.

  • CVE-2023-38802Aug 29, 2023
    affected < 1.1.1-17.10.1fixed 1.1.1-17.10.1

    FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).

  • CVE-2022-37032Sep 19, 2022
    affected < 1.1.1-17.13.1fixed 1.1.1-17.13.1

    An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.

  • CVE-2018-5381Feb 19, 2018
    affected < 1.1.1-17.13.1fixed 1.1.1-17.13.1

    The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a

  • CVE-2018-5380Feb 19, 2018
    affected < 1.1.1-17.13.1fixed 1.1.1-17.13.1

    The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.

  • CVE-2018-5379Feb 19, 2018
    affected < 1.1.1-17.13.1fixed 1.1.1-17.13.1

    The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary

  • CVE-2018-5378Feb 19, 2018
    affected < 1.1.1-17.13.1fixed 1.1.1-17.13.1

    The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.

  • CVE-2017-15865HigNov 8, 2017
    affected < 1.1.1-17.13.1fixed 1.1.1-17.13.1

    bgpd in FRRouting (FRR) before 2.0.2 and 3.x before 3.0.2, as used in Cumulus Linux before 3.4.3 and other products, allows remote attackers to obtain sensitive information via a malformed BGP UPDATE packet from a connected peer, which triggers transmission of up to a few thousan