Töma - We are working towards getting a CVE already yes. thanks! donald On Wed, Jan 9, 2019 at 1:16 PM Töma Gavrichenkov <ximaera@gmail.com> wrote:
Hi,
On 1/7/2019 1:31 PM, Quentin Young wrote:
This morning some users running FRR BGP noticed that their sessions were flapping. [..] We have a patch in testing now and expect to have new build artifacts published shortly. Additionally, we have contacted the experiment operators and requested a pause in the experiment while we handle this issue.
A flapping BGP session may possibly affect availability of an autonomous system, and, as long as CIA triad is concerned, availability is a part of security.
Has this been assigned a CVE number so that OS distributions as well as information security departments of possibly affected network entities would be aware of this properly and would act accordingly?
| Töma Gavrichenkov | gpg: 2deb 97b1 0a3c 151d b67f 1ee5 00e7 94bc 4d08 9191 | mailto: ximaera@gmail.com | fb: ximaera | telegram: xima_era | skype: xima_era | tel. no: +7 916 515 49 58
_______________________________________________ frog mailing list frog@lists.frrouting.org https://lists.frrouting.org/listinfo/frog