Bug 2223668 (CVE-2023-3748)
Summary: | CVE-2023-3748 frr: Inifinite loop in babld message parsing may cause DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Zack Miele <zmiele> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | mruprich |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | frr 8.5 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in FRRouting when parsing certain babeld unicast hello messages that are intended to be ignored. This issue may allow an attacker to send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to enter an infinite loop and cause a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-08-01 12:27:30 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2223673 | ||
Bug Blocks: | 2189456 |
Description
Zack Miele
2023-07-18 13:35:09 UTC
We do not ship babeld with our FRR package in RHEL. I am closing this bug report since it does not affect our package in RHEL. Sorry, accidentally closed a bug for Security response. Apologies. Opening the bug and closing the bug for FRR instead. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-3748 |