Improper Validation of Integrity Check Value Affecting frr package, versions <7.5.1-1.1+deb10u1
Threat Intelligence
EPSS
0.26% (66th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-FRR-5876493
- published 31 Aug 2023
- disclosed 29 Aug 2023
Introduced: 29 Aug 2023
CVE-2023-38802 Open this link in a new tabHow to fix?
Upgrade Debian:10 frr to version 7.5.1-1.1+deb10u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream frr package and not the frr package as distributed by Debian.
See How to fix? for Debian:10 relevant fixed versions and status.
FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).
References
- https://security-tracker.debian.org/tracker/CVE-2023-38802
- https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling
- https://news.ycombinator.com/item?id=37305800
- https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html
- https://www.debian.org/security/2023/dsa-5495
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/
CVSS Scores
version 3.1