Out-of-bounds Read Affecting frr package, versions <7.5.1-1.1+deb10u1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-FRR-5497433
- published 5 May 2023
- disclosed 3 May 2023
Introduced: 3 May 2023
CVE-2022-40302 Open this link in a new tabHow to fix?
Upgrade Debian:10 frr to version 7.5.1-1.1+deb10u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream frr package and not the frr package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.