git: 57f752e585e0 - main - security/vuxml: Fix bad copy/past in latest frr entry
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 28 Jun 2024 17:06:27 UTC
The branch main has been updated by olivier:
URL: https://cgit.FreeBSD.org/ports/commit/?id=57f752e585e0b1d6aefa48bab23b1508264d88ba
commit 57f752e585e0b1d6aefa48bab23b1508264d88ba
Author: Olivier Cochard <olivier@FreeBSD.org>
AuthorDate: 2024-06-28 17:05:39 +0000
Commit: Olivier Cochard <olivier@FreeBSD.org>
CommitDate: 2024-06-28 17:05:39 +0000
security/vuxml: Fix bad copy/past in latest frr entry
---
security/vuxml/vuln/2024.xml | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index 641d501a5081..98d777ada355 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -14,9 +14,7 @@
<body xmlns="http://www.w3.org/1999/xhtml">
<p>cve@mitre.org reports:</p>
<blockquote cite="https://frrouting.org/release/9.1.1/">
- <p>In FRRouting (FRR) through 9.1, there are multiplecan be a buffer overflow and
- daemon crash in ospf_te_parse_ri for OSPF LSA packets during an
- attempt to read Segment Routing subTLVs (their size is not validated).</p>
+ <p>In FRRouting (FRR) through 9.1, there are multiples vulnerabilities.</p>
<ul>
<li>CVE-2024-31950: buffer overflow and daemon crash in ospf_te_parse_ri for OSPF LSA packets</li>
<li>CVE-2024-31951: buffer overflow and daemon crash in ospf_te_parse_ext_link for OSPF LSA packets</li>