Headline
CVE-2022-26128: Incorrect checks on length in babeld · Issue #10502 · FRRouting/frr
A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input packet length in the babel_packet_examin function in babeld/message.c.
Comments
db-sca changed the title An incorrect check on length in babeld Incorrect checks on length in babeld
Feb 4, 2022
qingkaishi added a commit to qingkaishi/frr that referenced this issue
Feb 4, 2022
…n length
This patch repairs the checking conditions on length in four functions: babel_packet_examin, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv
Signed-off-by: qingkaishi [email protected]
qingkaishi added a commit to qingkaishi/frr that referenced this issue
Feb 4, 2022
…n length
This patch repairs the checking conditions on length in four functions: babel_packet_examin, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv
Signed-off-by: qingkaishi [email protected]
mergify bot pushed a commit that referenced this issue
Feb 8, 2022
This patch repairs the checking conditions on length in four functions: babel_packet_examin, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv
Signed-off-by: qingkaishi [email protected] (cherry picked from commit c379335)
plsaranya added a commit to plsaranya/frr that referenced this issue
Feb 28, 2022
…n length
This patch repairs the checking conditions on length in four functions: babel_packet_examin, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv
Signed-off-by: qingkaishi [email protected]