Resource Exhaustion Affecting frr-selinux package, versions <0:8.3.1-11.el9_3


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.08% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL9-FRRSELINUX-7875435
  • published3 Sept 2024
  • disclosed3 May 2023

Introduced: 3 May 2023

CVE-2022-40318  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade RHEL:9 frr-selinux to version 0:8.3.1-11.el9_3 or higher.
This issue was patched in RHSA-2023:6434.

NVD Description

Note: Versions mentioned in the description apply only to the upstream frr-selinux package and not the frr-selinux package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in bgp_open_option_parse in the bgp_open.c file, a different location (with a different attack vector) relative to CVE-2022-40302.

CVSS Scores

version 3.1