[FROG] Advisory - FRR BGP peer flaps @ 2019-01-07

Donald Sharp sharpd at cumulusnetworks.com
Wed Jan 9 13:41:40 EST 2019


Töma -

We are working towards getting a CVE already yes.

thanks!

donald

On Wed, Jan 9, 2019 at 1:16 PM Töma Gavrichenkov <ximaera at gmail.com> wrote:
>
> Hi,
>
> On 1/7/2019 1:31 PM, Quentin Young wrote:
> > This morning some users running FRR BGP noticed that their sessions were
> > flapping. [..]
> > We have a patch in testing now and expect to have new build artifacts published
> > shortly. Additionally, we have contacted the experiment operators and requested
> > a pause in the experiment while we handle this issue.
>
> A flapping BGP session may possibly affect availability of an
> autonomous system, and, as long as CIA triad is concerned,
> availability is a part of security.
>
> Has this been assigned a CVE number so that OS distributions as well
> as information security departments of possibly affected network
> entities would be aware of this properly and would act accordingly?
>
> | Töma Gavrichenkov
> | gpg: 2deb 97b1 0a3c 151d b67f 1ee5 00e7 94bc 4d08 9191
> | mailto: ximaera at gmail.com
> | fb: ximaera
> | telegram: xima_era
> | skype: xima_era
> | tel. no: +7 916 515 49 58
>
> _______________________________________________
> frog mailing list
> frog at lists.frrouting.org
> https://lists.frrouting.org/listinfo/frog



More information about the frog mailing list