git: 57f752e585e0 - main - security/vuxml: Fix bad copy/past in latest frr entry
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 28 Jun 2024 17:06:27 UTC
The branch main has been updated by olivier: URL: https://cgit.FreeBSD.org/ports/commit/?id=57f752e585e0b1d6aefa48bab23b1508264d88ba commit 57f752e585e0b1d6aefa48bab23b1508264d88ba Author: Olivier Cochard <olivier@FreeBSD.org> AuthorDate: 2024-06-28 17:05:39 +0000 Commit: Olivier Cochard <olivier@FreeBSD.org> CommitDate: 2024-06-28 17:05:39 +0000 security/vuxml: Fix bad copy/past in latest frr entry --- security/vuxml/vuln/2024.xml | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 641d501a5081..98d777ada355 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -14,9 +14,7 @@ <body xmlns="http://www.w3.org/1999/xhtml"> <p>cve@mitre.org reports:</p> <blockquote cite="https://frrouting.org/release/9.1.1/"> - <p>In FRRouting (FRR) through 9.1, there are multiplecan be a buffer overflow and - daemon crash in ospf_te_parse_ri for OSPF LSA packets during an - attempt to read Segment Routing subTLVs (their size is not validated).</p> + <p>In FRRouting (FRR) through 9.1, there are multiples vulnerabilities.</p> <ul> <li>CVE-2024-31950: buffer overflow and daemon crash in ospf_te_parse_ri for OSPF LSA packets</li> <li>CVE-2024-31951: buffer overflow and daemon crash in ospf_te_parse_ext_link for OSPF LSA packets</li>