Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ospfd: Fix heap corruption vulnerability when parsing SR-Algorithm TLV #16860

Merged

Conversation

aceelindem
Copy link
Collaborator

When parsing the SR-Algorithm TLV in the OSPF Router Information Opaque LSA, assure that not more than the maximum number of supported algorithms are copied from the TLV.

When parsing the SR-Algorithm TLV in the OSPF Router Information Opaque
LSA, assure that not more than the maximum number of supported
algorithms are copied from the TLV.

Signed-off-by: Acee Lindem <[email protected]>
@Jafaral
Copy link
Member

Jafaral commented Sep 18, 2024

@Mergifyio backport stable/10.1 stable/10.0 stable/9.1 stable/9.0 stable/8.5 stable/8.4

Copy link

mergify bot commented Sep 18, 2024

@aceelindem
Copy link
Collaborator Author

CI:rerun

@Jafaral Jafaral merged commit 9a009e1 into FRRouting:master Sep 18, 2024
14 checks passed
Jafaral added a commit that referenced this pull request Sep 19, 2024
ospfd: Fix heap corruption vulnerability when parsing SR-Algorithm TLV (backport #16860)
Jafaral added a commit that referenced this pull request Sep 19, 2024
ospfd: Fix heap corruption vulnerability when parsing SR-Algorithm TLV (backport #16860)
donaldsharp added a commit that referenced this pull request Sep 19, 2024
ospfd: Fix heap corruption vulnerability when parsing SR-Algorithm TLV (backport #16860)
donaldsharp added a commit that referenced this pull request Sep 19, 2024
ospfd: Fix heap corruption vulnerability when parsing SR-Algorithm TLV (backport #16860)
donaldsharp added a commit that referenced this pull request Sep 19, 2024
ospfd: Fix heap corruption vulnerability when parsing SR-Algorithm TLV (backport #16860)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants