ALT-PU-2023-2323-1
Package frr updated to version 8.4.2-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-02322
Уязвимость компонента BGP OPEN Message Handler программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting связана с выходом операции за границами буфера в памяти. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании
BDU:2023-02672
Уязвимость функции bgp_open_option_parse() демона bgpd программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-02673
Уязвимость демона bgpd программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-37032
An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
- https://bugzilla.suse.com/show_bug.cgi?id=1202023
- https://github.com/FRRouting/frr/commit/6d58272b4cf96f0daa846210dd2104877900f921
- https://github.com/FRRouting/frr/commit/ff6db1027f8f36df657ff2e5ea167773752537ed
- [debian-lts-announce] 20221128 [SECURITY] [DLA 3211-1] frr security update
- DSA-5362
- https://bugzilla.suse.com/show_bug.cgi?id=1202023
- DSA-5362
- [debian-lts-announce] 20221128 [SECURITY] [DLA 3211-1] frr security update
- https://github.com/FRRouting/frr/commit/ff6db1027f8f36df657ff2e5ea167773752537ed
- https://github.com/FRRouting/frr/commit/6d58272b4cf96f0daa846210dd2104877900f921
Modified: 2025-01-30
CVE-2022-40302
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.
Modified: 2024-11-21
CVE-2022-40318
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in bgp_open_option_parse in the bgp_open.c file, a different location (with a different attack vector) relative to CVE-2022-40302.
Modified: 2024-11-21
CVE-2022-43681
An out-of-bounds read exists in the BGP daemon of FRRouting FRR through 8.4. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition.