[ubuntu/oracular-proposed] frr 10.0.1-0.1ubuntu1 (Accepted)

Andreas Hasenack andreas at canonical.com
Wed Jul 31 20:46:12 UTC 2024


frr (10.0.1-0.1ubuntu1) oracular; urgency=medium

  * Merge with Debian unstable (LP: #2064404). Remaining changes:
    - Fix logging with Ubuntu's unprivileged rsyslog (LP #1958162):
      + d/frr.postinst: change log files ownership
      + d/frr.logrotate: change rotated log file ownership
  * Dropped security patches included upstream:
    - SECURITY UPDATE: DoS via MP_REACH_NLRI data
      + debian/patches/CVE-2023-46752.patch: handle MP_REACH_NLRI malformed
        packets with session reset in bgpd/bgp_attr.c, bgpd/bgp_attr.h,
        bgpd/bgp_packet.c.
      + CVE-2023-46752
    - SECURITY UPDATE: DoS via BGP UPDATE without mandatory attributes
      + debian/patches/CVE-2023-46753.patch: check mandatory attributes more
        carefully for UPDATE message in bgpd/bgp_attr.c.
      + CVE-2023-46753
    - SECURITY UPDATE: read beyond stream during labeled unicast parsing
      + debian/patches/CVE-2023-38407.patch: fix use beyond end of stream of
        labeled unicast parsing in bgpd/bgp_label.c.
      + CVE-2023-38407
    - SECURITY UPDATE: crash via malformed BGP UPDATE message
      + debian/patches/CVE-2023-47235.patch: treat EOR as withdrawn to avoid
        unwanted handling of malformed attrs in bgpd/bgp_attr.c.
      + CVE-2023-47235
    - SECURITY UPDATE: crash via MP_UNREACH_NLRI attribute
      + debian/patches/CVE-2023-47234.patch: ignore handling NLRIs if we
        received MP_UNREACH_NLRI in bgpd/bgp_attr.c, bgpd/bgp_attr.h,
        bgpd/bgp_packet.c.
      + CVE-2023-47234
    - SECURITY UPDATE: DoS via malformed OSPF LSA packet
      + debian/patches/CVE-2024-27913.patch: solved crash in OSPF TE parsing
        in ospfd/ospf_te.c.
      + CVE-2024-27913

Date: Mon, 29 Jul 2024 09:49:25 -0300
Changed-By: Andreas Hasenack <andreas at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/frr/10.0.1-0.1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Mon, 29 Jul 2024 09:49:25 -0300
Source: frr
Built-For-Profiles: noudeb
Architecture: source
Version: 10.0.1-0.1ubuntu1
Distribution: oracular
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Andreas Hasenack <andreas at canonical.com>
Launchpad-Bugs-Fixed: 2064404
Changes:
 frr (10.0.1-0.1ubuntu1) oracular; urgency=medium
 .
   * Merge with Debian unstable (LP: #2064404). Remaining changes:
     - Fix logging with Ubuntu's unprivileged rsyslog (LP #1958162):
       + d/frr.postinst: change log files ownership
       + d/frr.logrotate: change rotated log file ownership
   * Dropped security patches included upstream:
     - SECURITY UPDATE: DoS via MP_REACH_NLRI data
       + debian/patches/CVE-2023-46752.patch: handle MP_REACH_NLRI malformed
         packets with session reset in bgpd/bgp_attr.c, bgpd/bgp_attr.h,
         bgpd/bgp_packet.c.
       + CVE-2023-46752
     - SECURITY UPDATE: DoS via BGP UPDATE without mandatory attributes
       + debian/patches/CVE-2023-46753.patch: check mandatory attributes more
         carefully for UPDATE message in bgpd/bgp_attr.c.
       + CVE-2023-46753
     - SECURITY UPDATE: read beyond stream during labeled unicast parsing
       + debian/patches/CVE-2023-38407.patch: fix use beyond end of stream of
         labeled unicast parsing in bgpd/bgp_label.c.
       + CVE-2023-38407
     - SECURITY UPDATE: crash via malformed BGP UPDATE message
       + debian/patches/CVE-2023-47235.patch: treat EOR as withdrawn to avoid
         unwanted handling of malformed attrs in bgpd/bgp_attr.c.
       + CVE-2023-47235
     - SECURITY UPDATE: crash via MP_UNREACH_NLRI attribute
       + debian/patches/CVE-2023-47234.patch: ignore handling NLRIs if we
         received MP_UNREACH_NLRI in bgpd/bgp_attr.c, bgpd/bgp_attr.h,
         bgpd/bgp_packet.c.
       + CVE-2023-47234
     - SECURITY UPDATE: DoS via malformed OSPF LSA packet
       + debian/patches/CVE-2024-27913.patch: solved crash in OSPF TE parsing
         in ospfd/ospf_te.c.
       + CVE-2024-27913
Checksums-Sha1:
 2eb7343bbe28b16324ec9a0ccddd6846b76fbe5a 2852 frr_10.0.1-0.1ubuntu1.dsc
 4fe1a8fe93e0d71e25727a96958a48a6006d3697 8252364 frr_10.0.1.orig.tar.xz
 9bae2281c70378dd8b1beba2e824033262f6423d 34824 frr_10.0.1-0.1ubuntu1.debian.tar.xz
 30b7c6615edb2514b4e6c2452ce693409b4193c5 7444 frr_10.0.1-0.1ubuntu1_source.buildinfo
Checksums-Sha256:
 f9cf07e6ed981f697ac66811f573dd1d5eb69dde769a5d946ae460e4444dcff7 2852 frr_10.0.1-0.1ubuntu1.dsc
 9f4eccc4b165f0593e5d49085ad4d31ddf7f05043fb068ce8ce99340d7a37728 8252364 frr_10.0.1.orig.tar.xz
 c45c5eef8c69671a3cb860363a003c04088136177c865c1af4b9408e1cef83bc 34824 frr_10.0.1-0.1ubuntu1.debian.tar.xz
 d928bf884434f6c2ce25f6c42011cb2bdf765b72e2ebcd4bd407f18db2883c27 7444 frr_10.0.1-0.1ubuntu1_source.buildinfo
Files:
 5f21b89d0d2ea1ffc26bb5fd847a4758 2852 net optional frr_10.0.1-0.1ubuntu1.dsc
 51de4f8c64f3455b98da16ce6b71c510 8252364 net optional frr_10.0.1.orig.tar.xz
 7fefdb4d12e8788b11066ab025b1f51d 34824 net optional frr_10.0.1-0.1ubuntu1.debian.tar.xz
 4bbada88f927ba618f190a5f996df7e3 7444 net optional frr_10.0.1-0.1ubuntu1_source.buildinfo
Original-Maintainer: David Lamparter <equinox-debian at diac24.net>
Vcs-Git: https://git.launchpad.net/~ahasenack/ubuntu/+source/frr
Vcs-Git-Commit: 2586b52bb8bda26257c9a15b1fde4c7bdc8c38ef
Vcs-Git-Ref: refs/heads/oracular-frr-merge-1


More information about the oracular-changes mailing list