While working on the recent tcpdump issues (CAN-2005-1278, CAN-2005-1279, and CAN-2005-1280) Simon L. Nielsen from FreeBSD Security Team discovered that there is another similar infinite loop DoS vulnerability in the BGP handling code.
Created attachment 60774 [details, diff] tcpdump-bgp-infinite-loop2.patch
netmon: please bump with patch
*** Bug 95578 has been marked as a duplicate of this bug. ***
Bumped -r3 with patch.
Target KEYWORDS="x86 ppc sparc mips alpha arm hppa ia64 amd64 ppc64" Arches, please test and mark stable
stable on amd64
Stable on ppc.
Stable on hppa.
stable on alpha ia64
arm stable
Stable on ppc64.
Ready for GLSA vote. I would say YES, perhaps as an update to GLSA 200505-06 ?
/me votes yes too An update to 200505-06 sounds good since it already mentions BGP etc. anyways.
sent as GLSA 200505-06 update mips: remember to mark stable to benefit from GLSA
Stable on mips.