Security update for frr
Announcement ID: | SUSE-SU-2022:0901-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities and has one security fix can now be installed.
Description:
This update for frr fixes the following issues:
- CVE-2022-26125, CVE-2022-26126: Fixed buffer overflows in unpack_tlv_router_cap() (bsc#1196505, bsc#1196506).
- CVE-2022-26127: Fixed heap buffer overflow in babel_packet_examin() (bsc#1196503).
- CVE-2022-26128: Fixed buffer overflows in babel_packet_examin() (bsc#1196507).
- CVE-2022-26129: Fixed buffer overflows in parse_hello_subtlv(), parse_ihu_subtlv() and parse_update_subtlv() (bsc#1196504).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.3
zypper in -t patch SUSE-2022-901=1
-
Server Applications Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-901=1
Package List:
-
openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
- libfrrfpm_pb0-debuginfo-7.4-150300.4.3.1
- libfrrospfapiclient0-7.4-150300.4.3.1
- libfrrfpm_pb0-7.4-150300.4.3.1
- libmlag_pb0-debuginfo-7.4-150300.4.3.1
- libfrr_pb0-7.4-150300.4.3.1
- frr-7.4-150300.4.3.1
- frr-debuginfo-7.4-150300.4.3.1
- libmlag_pb0-7.4-150300.4.3.1
- libfrrospfapiclient0-debuginfo-7.4-150300.4.3.1
- frr-debugsource-7.4-150300.4.3.1
- libfrrsnmp0-7.4-150300.4.3.1
- libfrrcares0-debuginfo-7.4-150300.4.3.1
- libfrrcares0-7.4-150300.4.3.1
- libfrrzmq0-debuginfo-7.4-150300.4.3.1
- frr-devel-7.4-150300.4.3.1
- libfrrgrpc_pb0-debuginfo-7.4-150300.4.3.1
- libfrr0-7.4-150300.4.3.1
- libfrr0-debuginfo-7.4-150300.4.3.1
- libfrr_pb0-debuginfo-7.4-150300.4.3.1
- libfrrsnmp0-debuginfo-7.4-150300.4.3.1
- libfrrgrpc_pb0-7.4-150300.4.3.1
- libfrrzmq0-7.4-150300.4.3.1
-
Server Applications Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- libfrrfpm_pb0-debuginfo-7.4-150300.4.3.1
- libfrrospfapiclient0-7.4-150300.4.3.1
- libfrrfpm_pb0-7.4-150300.4.3.1
- libmlag_pb0-debuginfo-7.4-150300.4.3.1
- libfrr_pb0-7.4-150300.4.3.1
- frr-7.4-150300.4.3.1
- frr-debuginfo-7.4-150300.4.3.1
- libmlag_pb0-7.4-150300.4.3.1
- libfrrospfapiclient0-debuginfo-7.4-150300.4.3.1
- frr-debugsource-7.4-150300.4.3.1
- libfrrsnmp0-7.4-150300.4.3.1
- libfrrcares0-debuginfo-7.4-150300.4.3.1
- libfrrcares0-7.4-150300.4.3.1
- libfrrzmq0-debuginfo-7.4-150300.4.3.1
- frr-devel-7.4-150300.4.3.1
- libfrrgrpc_pb0-debuginfo-7.4-150300.4.3.1
- libfrr0-7.4-150300.4.3.1
- libfrr0-debuginfo-7.4-150300.4.3.1
- libfrr_pb0-debuginfo-7.4-150300.4.3.1
- libfrrsnmp0-debuginfo-7.4-150300.4.3.1
- libfrrgrpc_pb0-7.4-150300.4.3.1
- libfrrzmq0-7.4-150300.4.3.1
References:
- https://www.suse.com/security/cve/CVE-2022-26125.html
- https://www.suse.com/security/cve/CVE-2022-26126.html
- https://www.suse.com/security/cve/CVE-2022-26127.html
- https://www.suse.com/security/cve/CVE-2022-26128.html
- https://www.suse.com/security/cve/CVE-2022-26129.html
- https://bugzilla.suse.com/show_bug.cgi?id=1180217
- https://bugzilla.suse.com/show_bug.cgi?id=1196503
- https://bugzilla.suse.com/show_bug.cgi?id=1196504
- https://bugzilla.suse.com/show_bug.cgi?id=1196505
- https://bugzilla.suse.com/show_bug.cgi?id=1196506
- https://bugzilla.suse.com/show_bug.cgi?id=1196507