CVE-2023-3748

NameCVE-2023-3748
DescriptionA flaw was found in FRRouting when parsing certain babeld unicast hello messages that are intended to be ignored. This issue may allow an attacker to send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to enter an infinite loop and cause a denial of service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1042473

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
frr (PTS)buster6.0.2-2+deb10u1fixed
buster (security)7.5.1-1.1+deb10u1fixed
bullseye (security), bullseye7.5.1-1.1+deb11u2fixed
bookworm, bookworm (security)8.4.4-1.1~deb12u1vulnerable
sid10.0-0.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
frrsourcebuster(not affected)
frrsourcebullseye(not affected)
frrsource(unstable)9.1-0.11042473

Notes

[bullseye] - frr <not-affected> (The vulnerable code was introduced later)
[buster] - frr <not-affected> (The vulnerable code was introduced later)
https://github.com/FRRouting/frr/issues/11808
https://github.com/FRRouting/frr/pull/12950
https://github.com/FRRouting/frr/pull/12952
https://github.com/FRRouting/frr/commit/0a95d121ca8e1f43d41d952d6c82d111ca850085 (frr-8.5)

Search for package or bug name: Reporting problems