Bug 2235840 (CVE-2023-41359)

Summary: CVE-2023-41359 frr: out of bounds read in bgp_attr_aigp_valid
Product: [Other] Security Response Reporter: Anten Skrabec <askrabec>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: fhrdina, mruprich
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: frr-9.1-rc, frr 8.5-stable Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in FRRouting that involves a heap-based buffer overflow in the bgp_attr_aigp_valid() function within bgpd/bgp_attr.c. This flaw allows a remote attacker to send specially crafted data to the application, initiating an out-of-bounds read error and executing a denial of service (DoS) attack.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2236312, 2236313, 2236471, 2236472, 2236473    
Bug Blocks: 2230985    

Description Anten Skrabec 2023-08-29 20:49:03 UTC
An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation.

https://github.com/FRRouting/frr/pull/14232

Comment 3 msiddiqu 2023-08-31 10:50:34 UTC
Created frr tracking bugs for this issue:

Affects: fedora-all [bug 2236471]

Comment 6 errata-xmlrpc 2024-04-30 09:42:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2156 https://access.redhat.com/errata/RHSA-2024:2156