summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Baumann <daniel@debian.org>2024-12-26 22:03:59 +0100
committerDaniel Baumann <daniel@debian.org>2024-12-26 22:04:40 +0100
commitd4942afaee17039a0313df44219a0335bcb596b3 (patch)
treee12a5946f91477fc8bcf5e16723dc83a4e871b14
parentRemoving CVE-2023-41360.patch, included in 8.4.5. (diff)
downloadfrr-d4942afaee17039a0313df44219a0335bcb596b3.tar.xz
frr-d4942afaee17039a0313df44219a0335bcb596b3.zip
Removing unused CVE-2023-41361.patch, 8.4 is not vulnerable anyway.
Signed-off-by: Daniel Baumann <daniel@debian.org>
-rw-r--r--debian/patches/CVE-2023-41361.patch43
1 files changed, 0 insertions, 43 deletions
diff --git a/debian/patches/CVE-2023-41361.patch b/debian/patches/CVE-2023-41361.patch
deleted file mode 100644
index a227dc29..00000000
--- a/debian/patches/CVE-2023-41361.patch
+++ /dev/null
@@ -1,43 +0,0 @@
-From 73ad93a83f18564bb7bff4659872f7ec1a64b05e Mon Sep 17 00:00:00 2001
-From: Donatas Abraitis <donatas@opensourcerouting.org>
-Date: Sun, 20 Aug 2023 21:37:25 +0300
-Subject: [PATCH] bgpd: Check the length of the rcv software version
-
-Make sure we don't exceed the maximum of BGP_MAX_SOFT_VERSION.
-
-The Capability Length SHOULD be no greater than 64.
-
-Reported-by: Iggy Frankovic <iggyfran@amazon.com>
-Signed-off-by: Donatas Abraitis <donatas@opensourcerouting.org>
-(cherry picked from commit b4d09af9194d20a7f9f16995a062f5d8e3d32840)
----
- bgpd/bgp_open.c | 12 +++++++++++-
- 1 file changed, 11 insertions(+), 1 deletion(-)
-
-diff --git a/bgpd/bgp_open.c b/bgpd/bgp_open.c
-index 0dd546397..e7e3c2191 100644
---- a/bgpd/bgp_open.c
-+++ b/bgpd/bgp_open.c
-@@ -940,8 +940,18 @@ static int bgp_capability_software_version(struct peer *peer,
- return -1;
- }
-
-- if (len) {
-+ if (len > BGP_MAX_SOFT_VERSION) {
-+ flog_warn(EC_BGP_CAPABILITY_INVALID_LENGTH,
-+ "%s: Received Software Version, but the length is too big, truncating, from peer %s",
-+ __func__, peer->host);
-+ stream_get(str, s, BGP_MAX_SOFT_VERSION);
-+ stream_forward_getp(s, len - BGP_MAX_SOFT_VERSION);
-+ len = BGP_MAX_SOFT_VERSION;
-+ } else if (len) {
- stream_get(str, s, len);
-+ }
-+
-+ if (len) {
- str[len] = '\0';
-
- XFREE(MTYPE_BGP_SOFT_VERSION, peer->soft_version);
---
-2.39.2
-