[BPF] Fwd: [FROG] New Releases of FRR
Humberto Galiza
humbertogaliza em gmail.com
Quinta Janeiro 10 08:13:24 -02 2019
FYI. Sugiro a quem utiliza o VyOS com o FRR ao invés do Quagga
verificar se já há uma atualização do VyOS disponível com esse patch.
[]s!
Humberto Galiza
---------- Forwarded message ---------
From: Donald Sharp <sharpd em cumulusnetworks.com>
Date: Thu, 10 Jan 2019 at 01:35
Subject: [FROG] New Releases of FRR
To: frog <frog em lists.frrouting.org>, FRRouting-Dev
<dev em lists.frrouting.org>, <announce em lists.frrouting.org>
All -
On Monday a research group installed into the global BGP routing table
a prefix with a attribute type of 0xFF, which is designated as
experimental by BGP RFC's. FRR had a developmental escape that read
this attribute incorrectly and caused the bgp peering session to flap.
If you have compiled FRR with the `--enable-bgp-vnc` option and run
BGP as a peer on the global routing table you are vulnerable to this
issue. This issue has been fixed in FRR with this commit:
https://github.com/FRRouting/frr/commit/943d595a018e69b550db08cccba1d0778a86705a
We have applied this fix to the stable/3.0(3.0.4), stable/4.0(4.0.1),
stable/5.0(5.0.2) and stable/6.0(6.0.2) branches. New releases can be
found here:
https://github.com/FRRouting/frr/releases/tag/frr-3.0.4
https://github.com/FRRouting/frr/releases/tag/frr-4.0.1
https://github.com/FRRouting/frr/releases/tag/frr-5.0.2
https://github.com/FRRouting/frr/releases/tag/frr-6.0.2
Snap packaging and the FreeBSD ports have been updated as well. We
recommend you update your installation of FRR immediately.
At this point we are applying for a CVE and will announce that
information when we have it.
In the near future we plan to implement RFC-7606 to handle this
situation better in BGP, if you have any questions please feel free to
email me, or to open up discussions on the frog alias.
thanks!
donald
_______________________________________________
frog mailing list
frog em lists.frrouting.org
https://lists.frrouting.org/listinfo/frog
More information about the bpf
mailing list