Bug 2196088 (CVE-2022-43681) - CVE-2022-43681 frr: out-of-bounds read exists in the BGP daemon of FRRouting
Summary: CVE-2022-43681 frr: out-of-bounds read exists in the BGP daemon of FRRouting
Keywords:
Status: NEW
Alias: CVE-2022-43681
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2196094 2196794
Blocks: 2193421
TreeView+ depends on / blocked
 
Reported: 2023-05-08 04:09 UTC by Sandipan Roy
Modified: 2023-11-07 08:16 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds read flaw exists in the BGP daemon of FRRouting. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads out of the bounds of the packet, throwing a SIGABRT signal and exiting. This issue results in a bgpd daemon restart, causing a denial of service.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6434 0 None None None 2023-11-07 08:16:40 UTC

Description Sandipan Roy 2023-05-08 04:09:17 UTC
An out-of-bounds read exists in the BGP daemon of FRRouting FRR through 8.4. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition.

https://forescout.com
https://github.com/advisories/GHSA-x7mf-v6gh-vm4g

Comment 4 errata-xmlrpc 2023-11-07 08:16:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6434 https://access.redhat.com/errata/RHSA-2023:6434


Note You need to log in before you can comment on or make changes to this bug.