Out-of-bounds Read Affecting frr package, versions <7.5.1-1.1+deb10u1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-FRR-5497429
- published 5 May 2023
- disclosed 3 May 2023
Introduced: 3 May 2023
CVE-2022-40318 Open this link in a new tabHow to fix?
Upgrade Debian:10 frr to version 7.5.1-1.1+deb10u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream frr package and not the frr package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in bgp_open_option_parse in the bgp_open.c file, a different location (with a different attack vector) relative to CVE-2022-40302.