An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in bgpopenoptionparse in the bgpopen.c file, a different location (with a different attack vector) relative to CVE-2022-40302.
{ "binaries": [ { "binary_name": "frr", "binary_version": "7.2.1-1ubuntu0.2" }, { "binary_name": "frr-dbgsym", "binary_version": "7.2.1-1ubuntu0.2" }, { "binary_name": "frr-doc", "binary_version": "7.2.1-1ubuntu0.2" }, { "binary_name": "frr-pythontools", "binary_version": "7.2.1-1ubuntu0.2" }, { "binary_name": "frr-rpki-rtrlib", "binary_version": "7.2.1-1ubuntu0.2" }, { "binary_name": "frr-rpki-rtrlib-dbgsym", "binary_version": "7.2.1-1ubuntu0.2" }, { "binary_name": "frr-snmp", "binary_version": "7.2.1-1ubuntu0.2" }, { "binary_name": "frr-snmp-dbgsym", "binary_version": "7.2.1-1ubuntu0.2" } ], "availability": "No subscription required", "ubuntu_priority": "medium" }
{ "binaries": [ { "binary_name": "frr", "binary_version": "8.1-1ubuntu1.3" }, { "binary_name": "frr-dbgsym", "binary_version": "8.1-1ubuntu1.3" }, { "binary_name": "frr-doc", "binary_version": "8.1-1ubuntu1.3" }, { "binary_name": "frr-pythontools", "binary_version": "8.1-1ubuntu1.3" }, { "binary_name": "frr-rpki-rtrlib", "binary_version": "8.1-1ubuntu1.3" }, { "binary_name": "frr-rpki-rtrlib-dbgsym", "binary_version": "8.1-1ubuntu1.3" }, { "binary_name": "frr-snmp", "binary_version": "8.1-1ubuntu1.3" }, { "binary_name": "frr-snmp-dbgsym", "binary_version": "8.1-1ubuntu1.3" } ], "availability": "No subscription required", "ubuntu_priority": "medium" }