An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.
{
"binaries": [
{
"binary_version": "7.2.1-1ubuntu0.2",
"binary_name": "frr"
},
{
"binary_version": "7.2.1-1ubuntu0.2",
"binary_name": "frr-dbgsym"
},
{
"binary_version": "7.2.1-1ubuntu0.2",
"binary_name": "frr-doc"
},
{
"binary_version": "7.2.1-1ubuntu0.2",
"binary_name": "frr-pythontools"
},
{
"binary_version": "7.2.1-1ubuntu0.2",
"binary_name": "frr-rpki-rtrlib"
},
{
"binary_version": "7.2.1-1ubuntu0.2",
"binary_name": "frr-rpki-rtrlib-dbgsym"
},
{
"binary_version": "7.2.1-1ubuntu0.2",
"binary_name": "frr-snmp"
},
{
"binary_version": "7.2.1-1ubuntu0.2",
"binary_name": "frr-snmp-dbgsym"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "8.1-1ubuntu1.3",
"binary_name": "frr"
},
{
"binary_version": "8.1-1ubuntu1.3",
"binary_name": "frr-dbgsym"
},
{
"binary_version": "8.1-1ubuntu1.3",
"binary_name": "frr-doc"
},
{
"binary_version": "8.1-1ubuntu1.3",
"binary_name": "frr-pythontools"
},
{
"binary_version": "8.1-1ubuntu1.3",
"binary_name": "frr-rpki-rtrlib"
},
{
"binary_version": "8.1-1ubuntu1.3",
"binary_name": "frr-rpki-rtrlib-dbgsym"
},
{
"binary_version": "8.1-1ubuntu1.3",
"binary_name": "frr-snmp"
},
{
"binary_version": "8.1-1ubuntu1.3",
"binary_name": "frr-snmp-dbgsym"
}
],
"availability": "No subscription required"
}