An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "7.2.1-1ubuntu0.2", "binary_name": "frr" }, { "binary_version": "7.2.1-1ubuntu0.2", "binary_name": "frr-dbgsym" }, { "binary_version": "7.2.1-1ubuntu0.2", "binary_name": "frr-doc" }, { "binary_version": "7.2.1-1ubuntu0.2", "binary_name": "frr-pythontools" }, { "binary_version": "7.2.1-1ubuntu0.2", "binary_name": "frr-rpki-rtrlib" }, { "binary_version": "7.2.1-1ubuntu0.2", "binary_name": "frr-rpki-rtrlib-dbgsym" }, { "binary_version": "7.2.1-1ubuntu0.2", "binary_name": "frr-snmp" }, { "binary_version": "7.2.1-1ubuntu0.2", "binary_name": "frr-snmp-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "8.1-1ubuntu1.3", "binary_name": "frr" }, { "binary_version": "8.1-1ubuntu1.3", "binary_name": "frr-dbgsym" }, { "binary_version": "8.1-1ubuntu1.3", "binary_name": "frr-doc" }, { "binary_version": "8.1-1ubuntu1.3", "binary_name": "frr-pythontools" }, { "binary_version": "8.1-1ubuntu1.3", "binary_name": "frr-rpki-rtrlib" }, { "binary_version": "8.1-1ubuntu1.3", "binary_name": "frr-rpki-rtrlib-dbgsym" }, { "binary_version": "8.1-1ubuntu1.3", "binary_name": "frr-snmp" }, { "binary_version": "8.1-1ubuntu1.3", "binary_name": "frr-snmp-dbgsym" } ] }