Name | CVE-2022-40302 |
Description | An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1035829 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
frr (PTS) | buster | 6.0.2-2+deb10u1 | vulnerable |
buster (security) | 6.0.2-2+deb10u2 | vulnerable | |
bullseye (security), bullseye | 7.5.1-1.1+deb11u1 | vulnerable | |
bookworm, sid | 8.4.2-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
frr | source | (unstable) | (unfixed) | 1035829 |
https://github.com/FRRouting/frr/issues/13427
https://github.com/FRRouting/frr/issues/13480
Fixes for CVE-2022-43681/CVE-2022-40318/CVE-2022-40302:
https://github.com/FRRouting/frr/commit/1117baca3c592877a4d8a13ed6a1d9bd83977487 (base_8.4)
https://github.com/FRRouting/frr/commit/3e46b43e3788f0f87bae56a86b54d412b4710286 (base_8.4)
https://github.com/FRRouting/frr/commit/766eec1b7accffe2c04a5c9ebb14e9f487bb9f78 (base_8.5)