Bug 2058650 (CVE-2022-26129) - CVE-2022-26129 frrouting: Buffer overflow in functions parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c
Summary: CVE-2022-26129 frrouting: Buffer overflow in functions parse_hello_subtlv, pa...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2022-26129
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2072481 2072482 2072483
Blocks: 2058651
TreeView+ depends on / blocked
 
Reported: 2022-02-25 14:25 UTC by Pedro Sampaio
Modified: 2022-09-19 19:51 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-04-07 11:17:43 UTC
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2022-02-25 14:25:20 UTC
Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv length in the functions, parse_hello_subtlv,
parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c.

Upstream bug:

https://github.com/FRRouting/frr/issues/10503

Comment 1 devthomp 2022-04-06 11:30:54 UTC
Created frr tracking bugs for this issue:

Affects: fedora-all [bug 2072483]


Note You need to log in before you can comment on or make changes to this bug.