CVE-2026-28532

NameCVE-2026-28532
DescriptionFRRouting before 10.5.3 contains an integer overflow vulnerability in seven OSPF Traffic Engineering and Segment Routing TLV parser functions where a uint16_t accumulator variable truncates uint32_t values returned by the TLV_SIZE() macro, causing the loop termination condition to fail while pointer advancement continues unchecked. Attackers with an established OSPF adjacency can send a crafted LS Update packet with a malicious Type 10 or Type 11 Opaque LSA to trigger out-of-bounds memory reads and crash all affected routers in the OSPF area or autonomous system.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
frr (PTS)bullseye7.5.1-1.1+deb11u2vulnerable
bullseye (security)7.5.1-1.1+deb11u4vulnerable
bookworm, bookworm (security)8.4.4-1.1~deb12u1vulnerable
trixie10.3-3vulnerable
forky, sid10.6.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
frrsource(unstable)10.5.3-1

Notes

https://github.com/FRRouting/frr/pull/21002
Fixed by: https://github.com/FRRouting/frr/commit/d3e8aedb87671f38db59b0df908e25e1d4af027d (main)
Fixed by: https://github.com/FRRouting/frr/commit/4b02ef93ef15030cb2d3d84a078cfb92e2c0aa84 (frr-10.5.3)

Search for package or bug name: Reporting problems