Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 28 Jun 2024 17:06:27 GMT
From:      Olivier Cochard <olivier@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 57f752e585e0 - main - security/vuxml: Fix bad copy/past in latest frr entry
Message-ID:  <202406281706.45SH6RXF068609@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by olivier:

URL: https://cgit.FreeBSD.org/ports/commit/?id=57f752e585e0b1d6aefa48bab23b1508264d88ba

commit 57f752e585e0b1d6aefa48bab23b1508264d88ba
Author:     Olivier Cochard <olivier@FreeBSD.org>
AuthorDate: 2024-06-28 17:05:39 +0000
Commit:     Olivier Cochard <olivier@FreeBSD.org>
CommitDate: 2024-06-28 17:05:39 +0000

    security/vuxml: Fix bad copy/past in latest frr entry
---
 security/vuxml/vuln/2024.xml | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index 641d501a5081..98d777ada355 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -14,9 +14,7 @@
 	<body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>cve@mitre.org reports:</p>
 	<blockquote cite="https://frrouting.org/release/9.1.1/">;
-	  <p>In FRRouting (FRR) through 9.1, there are multiplecan be a buffer overflow and
-	daemon crash in ospf_te_parse_ri for OSPF LSA packets during an
-	attempt to read Segment Routing subTLVs (their size is not validated).</p>
+	  <p>In FRRouting (FRR) through 9.1, there are multiples vulnerabilities.</p>
 	<ul>
 	 <li>CVE-2024-31950: buffer overflow and daemon crash in ospf_te_parse_ri for OSPF LSA packets</li>
 	 <li>CVE-2024-31951: buffer overflow and daemon crash in ospf_te_parse_ext_link for OSPF LSA packets</li>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202406281706.45SH6RXF068609>