Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-46752 (GCVE-0-2023-46752)
Vulnerability from cvelistv5 – Published: 2023-10-26 00:00 – Updated: 2025-11-04 16:10- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:10:40.016Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35"
},
{
"name": "[debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00007.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-46752",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-09T16:24:00.911370Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-09T16:24:26.246Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-28T07:05:56.949Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35"
},
{
"name": "[debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-46752",
"datePublished": "2023-10-26T00:00:00.000Z",
"dateReserved": "2023-10-26T00:00:00.000Z",
"dateUpdated": "2025-11-04T16:10:40.016Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-46752",
"date": "2026-05-20",
"epss": "0.00142",
"percentile": "0.33879"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.0.1\", \"matchCriteriaId\": \"96E183F4-1C38-4876-BA65-38E96CD3E5DC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.\"}, {\"lang\": \"es\", \"value\": \"Se descubri\\u00f3 un problema en FRRouting FRR hasta la versi\\u00f3n 9.0.1. Maneja mal los datos MP_REACH_NLRI con formato incorrecto, lo que provoca un bloqueo.\"}]",
"id": "CVE-2023-46752",
"lastModified": "2024-11-21T08:29:13.823",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 3.6}]}",
"published": "2023-10-26T05:15:26.067",
"references": "[{\"url\": \"https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-46752\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-10-26T05:15:26.067\",\"lastModified\":\"2025-11-04T17:15:38.353\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 un problema en FRRouting FRR hasta la versi\u00f3n 9.0.1. Maneja mal los datos MP_REACH_NLRI con formato incorrecto, lo que provoca un bloqueo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.0.1\",\"matchCriteriaId\":\"96E183F4-1C38-4876-BA65-38E96CD3E5DC\"}]}]}],\"references\":[{\"url\":\"https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/09/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html\", \"name\": \"[debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update\", \"tags\": [\"mailing-list\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/09/msg00007.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T16:10:40.016Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-46752\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-09T16:24:00.911370Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-09T16:24:21.496Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html\", \"name\": \"[debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update\", \"tags\": [\"mailing-list\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-04-28T07:05:56.949Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-46752\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T16:10:40.016Z\", \"dateReserved\": \"2023-10-26T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-10-26T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
alsa-2024:2156
Vulnerability from osv_almalinux
FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD.
Security Fix(es):
- frr: incorrect length check in bgp_capability_llgr() can lead do DoS (CVE-2023-31489)
- frr: missing length check in bgp_attr_psid_sub() can lead do DoS (CVE-2023-31490)
- frr: processes invalid NLRIs if attribute length is zero (CVE-2023-41358)
- frr: out of bounds read in bgp_attr_aigp_valid (CVE-2023-41359)
- frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c (CVE-2023-41909)
- frr: mishandled malformed data leading to a crash (CVE-2023-46752)
- frr: crafted BGP UPDATE message leading to a crash (CVE-2023-46753)
- frr: ahead-of-stream read of ORF header (CVE-2023-41360)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "frr"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.5.3-4.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "frr-selinux"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.5.3-4.el9"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD. \n\nSecurity Fix(es):\n\n* frr: incorrect length check in bgp_capability_llgr() can lead do DoS (CVE-2023-31489)\n* frr: missing length check in bgp_attr_psid_sub() can lead do DoS (CVE-2023-31490)\n* frr: processes invalid NLRIs if attribute length is zero (CVE-2023-41358)\n* frr: out of bounds read in bgp_attr_aigp_valid (CVE-2023-41359)\n* frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c (CVE-2023-41909)\n* frr: mishandled malformed data leading to a crash (CVE-2023-46752)\n* frr: crafted BGP UPDATE message leading to a crash (CVE-2023-46753)\n* frr: ahead-of-stream read of ORF header (CVE-2023-41360)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2024:2156",
"modified": "2024-05-07T15:04:45Z",
"published": "2024-04-30T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-31489"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-31490"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-41358"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-41359"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-41360"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-41909"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-46752"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-46753"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2235839"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2235840"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2235842"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2237416"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2238990"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2238992"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246379"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246381"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2024-2156.html"
}
],
"related": [
"CVE-2023-31489",
"CVE-2023-31490",
"CVE-2023-41358",
"CVE-2023-41359",
"CVE-2023-41909",
"CVE-2023-46752",
"CVE-2023-46753",
"CVE-2023-41360"
],
"summary": "Moderate: frr security update"
}
alsa-2024:2981
Vulnerability from osv_almalinux
FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD.
Security Fix(es):
- frr: missing length check in bgp_attr_psid_sub() can lead do DoS (CVE-2023-31490)
- frr: processes invalid NLRIs if attribute length is zero (CVE-2023-41358)
- frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c (CVE-2023-41909)
- frr: mishandled malformed data leading to a crash (CVE-2023-46752)
- frr: crafted BGP UPDATE message leading to a crash (CVE-2023-46753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "frr"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.5.1-22.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "frr-selinux"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.5.1-22.el8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD. \n\nSecurity Fix(es):\n\n* frr: missing length check in bgp_attr_psid_sub() can lead do DoS (CVE-2023-31490)\n* frr: processes invalid NLRIs if attribute length is zero (CVE-2023-41358)\n* frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c (CVE-2023-41909)\n* frr: mishandled malformed data leading to a crash (CVE-2023-46752)\n* frr: crafted BGP UPDATE message leading to a crash (CVE-2023-46753)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2024:2981",
"modified": "2024-05-29T14:43:20Z",
"published": "2024-05-22T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:2981"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-31490"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-41358"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-41909"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-46752"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-46753"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2235839"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2237416"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2238992"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246379"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246381"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-2981.html"
}
],
"related": [
"CVE-2023-31490",
"CVE-2023-41358",
"CVE-2023-41909",
"CVE-2023-46752",
"CVE-2023-46753"
],
"summary": "Moderate: frr security update"
}
BDU:2023-08243
Vulnerability from fstec - Published: 26.10.2023{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Novell Inc., Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Canonical Ltd., \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u041e\u041e\u041e \u00ab\u041d\u0426\u041f\u0420\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "15.5 (OpenSUSE Leap), 8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), - (openSUSE Tumbleweed), 20.04 LTS (Ubuntu), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 15.4 (OpenSUSE Leap), 15 SP4 (Suse Linux Enterprise Server), 22.04 LTS (Ubuntu), 9 (Red Hat Enterprise Linux), 4.3 (SUSE Manager Retail Branch Server), 4.3 (SUSE Manager Proxy), 4.3 (SUSE Manager Server), 15 SP4 (SUSE Linux Enterprise High Performance Computing), 15 SP4 (SUSE Linux Enterprise Module for Server Applications), 15 SP5 (SUSE Linux Enterprise Server for SAP Applications), 15 SP5 (Suse Linux Enterprise Server), 15 SP5 (SUSE Linux Enterprise High Performance Computing), 23.04 (Ubuntu), 15 SP5 (SUSE Linux Enterprise Module for Server Applications), \u0434\u043e 9.0.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (FRRouting), 9.5 (\u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f FRRouting:\nhttps://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2023-46752\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2023-46752\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/CVE-2023-46752\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2023-46752.html\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430: https://errata.msvsphere-os.ru/definition/9/INFCSA-2024:2156?lang=ru",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "26.10.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "19.11.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.11.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-08243",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-46752",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "OpenSUSE Leap, Red Hat Enterprise Linux, Debian GNU/Linux, openSUSE Tumbleweed, Ubuntu, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Suse Linux Enterprise Server, SUSE Manager Retail Branch Server, SUSE Manager Proxy, SUSE Manager Server, SUSE Linux Enterprise High Performance Computing, SUSE Linux Enterprise Module for Server Applications, SUSE Linux Enterprise Server for SAP Applications, FRRouting, \u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Novell Inc. OpenSUSE Leap 15.5 , Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Novell Inc. openSUSE Tumbleweed - , Canonical Ltd. Ubuntu 20.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Novell Inc. OpenSUSE Leap 15.4 , Novell Inc. Suse Linux Enterprise Server 15 SP4 , Canonical Ltd. Ubuntu 22.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 9 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP5 , Novell Inc. Suse Linux Enterprise Server 15 SP5 , Canonical Ltd. Ubuntu 23.04 , \u041e\u041e\u041e \u00ab\u041d\u0426\u041f\u0420\u00bb \u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430 9.5 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0430 Unix-\u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 FRRouting, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0430 Unix-\u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 FRRouting \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://ubuntu.com/security/CVE-2023-46752\nhttps://security-tracker.debian.org/tracker/CVE-2023-46752\nhttps://www.suse.com/security/cve/CVE-2023-46752.html\nhttps://access.redhat.com/security/cve/CVE-2023-46752\nhttps://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://errata.msvsphere-os.ru/definition/9/INFCSA-2024:2156?lang=ru",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,9)"
}
FKIE_CVE-2023-46752
Vulnerability from fkie_nvd - Published: 2023-10-26 05:15 - Updated: 2025-11-04 17:15| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35 | Patch | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/09/msg00007.html |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96E183F4-1C38-4876-BA65-38E96CD3E5DC",
"versionEndIncluding": "9.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en FRRouting FRR hasta la versi\u00f3n 9.0.1. Maneja mal los datos MP_REACH_NLRI con formato incorrecto, lo que provoca un bloqueo."
}
],
"id": "CVE-2023-46752",
"lastModified": "2025-11-04T17:15:38.353",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-26T05:15:26.067",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35"
},
{
"source": "cve@mitre.org",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00007.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-V7W5-G2HV-9797
Vulnerability from github – Published: 2023-10-26 06:30 – Updated: 2025-11-04 18:30An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.
{
"affected": [],
"aliases": [
"CVE-2023-46752"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-10-26T05:15:26Z",
"severity": "HIGH"
},
"details": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.",
"id": "GHSA-v7w5-g2hv-9797",
"modified": "2025-11-04T18:30:44Z",
"published": "2023-10-26T06:30:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46752"
},
{
"type": "WEB",
"url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00007.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2023-46752
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-46752",
"id": "GSD-2023-46752"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-46752"
],
"details": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.",
"id": "GSD-2023-46752",
"modified": "2023-12-13T01:20:53.266579Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2023-46752",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35",
"refsource": "MISC",
"url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35"
},
{
"name": "[debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frrouting:frrouting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96E183F4-1C38-4876-BA65-38E96CD3E5DC",
"versionEndIncluding": "9.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en FRRouting FRR hasta la versi\u00f3n 9.0.1. Maneja mal los datos MP_REACH_NLRI con formato incorrecto, lo que provoca un bloqueo."
}
],
"id": "CVE-2023-46752",
"lastModified": "2024-04-28T07:15:08.540",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-26T05:15:26.067",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35"
},
{
"source": "cve@mitre.org",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
MSRC_CVE-2023-46752
Vulnerability from csaf_microsoft - Published: 2023-10-01 00:00 - Updated: 2026-02-18 02:14| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 20139-17084 | — | ||
| Unresolved product id: 18275-17086 | — | ||
| Unresolved product id: 18267-17084 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2023/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2023/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46752 An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data leading to a crash. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-46752.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data leading to a crash.",
"tracking": {
"current_release_date": "2026-02-18T02:14:23.000Z",
"generator": {
"date": "2026-02-18T11:57:01.064Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-46752",
"initial_release_date": "2023-10-01T00:00:00.000Z",
"revision_history": [
{
"date": "2023-10-30T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-02-18T02:14:23.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 frr 8.5.3-2",
"product": {
"name": "\u003cazl3 frr 8.5.3-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 frr 8.5.3-2",
"product": {
"name": "azl3 frr 8.5.3-2",
"product_id": "20139"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 frr 8.5.3-3",
"product": {
"name": "\u003ccbl2 frr 8.5.3-3",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 frr 8.5.3-3",
"product": {
"name": "cbl2 frr 8.5.3-3",
"product_id": "18275"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 frr 9.1-2",
"product": {
"name": "\u003cazl3 frr 9.1-2",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 frr 9.1-2",
"product": {
"name": "azl3 frr 9.1-2",
"product_id": "18267"
}
}
],
"category": "product_name",
"name": "frr"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 frr 8.5.3-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 frr 8.5.3-2 as a component of Azure Linux 3.0",
"product_id": "20139-17084"
},
"product_reference": "20139",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 frr 8.5.3-3 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 frr 8.5.3-3 as a component of CBL Mariner 2.0",
"product_id": "18275-17086"
},
"product_reference": "18275",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 frr 9.1-2 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 frr 9.1-2 as a component of Azure Linux 3.0",
"product_id": "18267-17084"
},
"product_reference": "18267",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-46752",
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20139-17084",
"18275-17086",
"18267-17084"
],
"known_affected": [
"17084-1",
"17086-2",
"17084-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46752 An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data leading to a crash. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-46752.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-30T00:00:00.000Z",
"details": "9.1-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1",
"17084-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-10-30T00:00:00.000Z",
"details": "8.5.3-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17084-1",
"17086-2",
"17084-3"
]
}
],
"title": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data leading to a crash."
}
]
}
OPENSUSE-SU-2024:13387-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:frr-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-devel-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-devel-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-devel-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-devel-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrcares0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrcares0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrcares0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrcares0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:frr-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-devel-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-devel-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-devel-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:frr-devel-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrcares0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrcares0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrcares0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrcares0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2023-46752/ | self |
| https://www.suse.com/security/cve/CVE-2023-46753/ | self |
| https://www.suse.com/security/cve/CVE-2023-46752 | external |
| https://bugzilla.suse.com/1216627 | external |
| https://www.suse.com/security/cve/CVE-2023-46753 | external |
| https://bugzilla.suse.com/1216626 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "frr-8.4-7.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the frr-8.4-7.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13387",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13387-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-46752 page",
"url": "https://www.suse.com/security/cve/CVE-2023-46752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-46753 page",
"url": "https://www.suse.com/security/cve/CVE-2023-46753/"
}
],
"title": "frr-8.4-7.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13387-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "frr-8.4-7.1.aarch64",
"product": {
"name": "frr-8.4-7.1.aarch64",
"product_id": "frr-8.4-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "frr-devel-8.4-7.1.aarch64",
"product": {
"name": "frr-devel-8.4-7.1.aarch64",
"product_id": "frr-devel-8.4-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfrr0-8.4-7.1.aarch64",
"product": {
"name": "libfrr0-8.4-7.1.aarch64",
"product_id": "libfrr0-8.4-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfrr_pb0-8.4-7.1.aarch64",
"product": {
"name": "libfrr_pb0-8.4-7.1.aarch64",
"product_id": "libfrr_pb0-8.4-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfrrcares0-8.4-7.1.aarch64",
"product": {
"name": "libfrrcares0-8.4-7.1.aarch64",
"product_id": "libfrrcares0-8.4-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfrrfpm_pb0-8.4-7.1.aarch64",
"product": {
"name": "libfrrfpm_pb0-8.4-7.1.aarch64",
"product_id": "libfrrfpm_pb0-8.4-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfrrospfapiclient0-8.4-7.1.aarch64",
"product": {
"name": "libfrrospfapiclient0-8.4-7.1.aarch64",
"product_id": "libfrrospfapiclient0-8.4-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfrrsnmp0-8.4-7.1.aarch64",
"product": {
"name": "libfrrsnmp0-8.4-7.1.aarch64",
"product_id": "libfrrsnmp0-8.4-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libfrrzmq0-8.4-7.1.aarch64",
"product": {
"name": "libfrrzmq0-8.4-7.1.aarch64",
"product_id": "libfrrzmq0-8.4-7.1.aarch64"
}
},
{
"category": "product_version",
"name": "libmlag_pb0-8.4-7.1.aarch64",
"product": {
"name": "libmlag_pb0-8.4-7.1.aarch64",
"product_id": "libmlag_pb0-8.4-7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-8.4-7.1.ppc64le",
"product": {
"name": "frr-8.4-7.1.ppc64le",
"product_id": "frr-8.4-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "frr-devel-8.4-7.1.ppc64le",
"product": {
"name": "frr-devel-8.4-7.1.ppc64le",
"product_id": "frr-devel-8.4-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfrr0-8.4-7.1.ppc64le",
"product": {
"name": "libfrr0-8.4-7.1.ppc64le",
"product_id": "libfrr0-8.4-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfrr_pb0-8.4-7.1.ppc64le",
"product": {
"name": "libfrr_pb0-8.4-7.1.ppc64le",
"product_id": "libfrr_pb0-8.4-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfrrcares0-8.4-7.1.ppc64le",
"product": {
"name": "libfrrcares0-8.4-7.1.ppc64le",
"product_id": "libfrrcares0-8.4-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfrrfpm_pb0-8.4-7.1.ppc64le",
"product": {
"name": "libfrrfpm_pb0-8.4-7.1.ppc64le",
"product_id": "libfrrfpm_pb0-8.4-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfrrospfapiclient0-8.4-7.1.ppc64le",
"product": {
"name": "libfrrospfapiclient0-8.4-7.1.ppc64le",
"product_id": "libfrrospfapiclient0-8.4-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfrrsnmp0-8.4-7.1.ppc64le",
"product": {
"name": "libfrrsnmp0-8.4-7.1.ppc64le",
"product_id": "libfrrsnmp0-8.4-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libfrrzmq0-8.4-7.1.ppc64le",
"product": {
"name": "libfrrzmq0-8.4-7.1.ppc64le",
"product_id": "libfrrzmq0-8.4-7.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libmlag_pb0-8.4-7.1.ppc64le",
"product": {
"name": "libmlag_pb0-8.4-7.1.ppc64le",
"product_id": "libmlag_pb0-8.4-7.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-8.4-7.1.s390x",
"product": {
"name": "frr-8.4-7.1.s390x",
"product_id": "frr-8.4-7.1.s390x"
}
},
{
"category": "product_version",
"name": "frr-devel-8.4-7.1.s390x",
"product": {
"name": "frr-devel-8.4-7.1.s390x",
"product_id": "frr-devel-8.4-7.1.s390x"
}
},
{
"category": "product_version",
"name": "libfrr0-8.4-7.1.s390x",
"product": {
"name": "libfrr0-8.4-7.1.s390x",
"product_id": "libfrr0-8.4-7.1.s390x"
}
},
{
"category": "product_version",
"name": "libfrr_pb0-8.4-7.1.s390x",
"product": {
"name": "libfrr_pb0-8.4-7.1.s390x",
"product_id": "libfrr_pb0-8.4-7.1.s390x"
}
},
{
"category": "product_version",
"name": "libfrrcares0-8.4-7.1.s390x",
"product": {
"name": "libfrrcares0-8.4-7.1.s390x",
"product_id": "libfrrcares0-8.4-7.1.s390x"
}
},
{
"category": "product_version",
"name": "libfrrfpm_pb0-8.4-7.1.s390x",
"product": {
"name": "libfrrfpm_pb0-8.4-7.1.s390x",
"product_id": "libfrrfpm_pb0-8.4-7.1.s390x"
}
},
{
"category": "product_version",
"name": "libfrrospfapiclient0-8.4-7.1.s390x",
"product": {
"name": "libfrrospfapiclient0-8.4-7.1.s390x",
"product_id": "libfrrospfapiclient0-8.4-7.1.s390x"
}
},
{
"category": "product_version",
"name": "libfrrsnmp0-8.4-7.1.s390x",
"product": {
"name": "libfrrsnmp0-8.4-7.1.s390x",
"product_id": "libfrrsnmp0-8.4-7.1.s390x"
}
},
{
"category": "product_version",
"name": "libfrrzmq0-8.4-7.1.s390x",
"product": {
"name": "libfrrzmq0-8.4-7.1.s390x",
"product_id": "libfrrzmq0-8.4-7.1.s390x"
}
},
{
"category": "product_version",
"name": "libmlag_pb0-8.4-7.1.s390x",
"product": {
"name": "libmlag_pb0-8.4-7.1.s390x",
"product_id": "libmlag_pb0-8.4-7.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-8.4-7.1.x86_64",
"product": {
"name": "frr-8.4-7.1.x86_64",
"product_id": "frr-8.4-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "frr-devel-8.4-7.1.x86_64",
"product": {
"name": "frr-devel-8.4-7.1.x86_64",
"product_id": "frr-devel-8.4-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfrr0-8.4-7.1.x86_64",
"product": {
"name": "libfrr0-8.4-7.1.x86_64",
"product_id": "libfrr0-8.4-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfrr_pb0-8.4-7.1.x86_64",
"product": {
"name": "libfrr_pb0-8.4-7.1.x86_64",
"product_id": "libfrr_pb0-8.4-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfrrcares0-8.4-7.1.x86_64",
"product": {
"name": "libfrrcares0-8.4-7.1.x86_64",
"product_id": "libfrrcares0-8.4-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfrrfpm_pb0-8.4-7.1.x86_64",
"product": {
"name": "libfrrfpm_pb0-8.4-7.1.x86_64",
"product_id": "libfrrfpm_pb0-8.4-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfrrospfapiclient0-8.4-7.1.x86_64",
"product": {
"name": "libfrrospfapiclient0-8.4-7.1.x86_64",
"product_id": "libfrrospfapiclient0-8.4-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfrrsnmp0-8.4-7.1.x86_64",
"product": {
"name": "libfrrsnmp0-8.4-7.1.x86_64",
"product_id": "libfrrsnmp0-8.4-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libfrrzmq0-8.4-7.1.x86_64",
"product": {
"name": "libfrrzmq0-8.4-7.1.x86_64",
"product_id": "libfrrzmq0-8.4-7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libmlag_pb0-8.4-7.1.x86_64",
"product": {
"name": "libmlag_pb0-8.4-7.1.x86_64",
"product_id": "libmlag_pb0-8.4-7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:frr-8.4-7.1.aarch64"
},
"product_reference": "frr-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:frr-8.4-7.1.ppc64le"
},
"product_reference": "frr-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:frr-8.4-7.1.s390x"
},
"product_reference": "frr-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:frr-8.4-7.1.x86_64"
},
"product_reference": "frr-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-devel-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:frr-devel-8.4-7.1.aarch64"
},
"product_reference": "frr-devel-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-devel-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:frr-devel-8.4-7.1.ppc64le"
},
"product_reference": "frr-devel-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-devel-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:frr-devel-8.4-7.1.s390x"
},
"product_reference": "frr-devel-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-devel-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:frr-devel-8.4-7.1.x86_64"
},
"product_reference": "frr-devel-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrr0-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrr0-8.4-7.1.aarch64"
},
"product_reference": "libfrr0-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrr0-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrr0-8.4-7.1.ppc64le"
},
"product_reference": "libfrr0-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrr0-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrr0-8.4-7.1.s390x"
},
"product_reference": "libfrr0-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrr0-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrr0-8.4-7.1.x86_64"
},
"product_reference": "libfrr0-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrr_pb0-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.aarch64"
},
"product_reference": "libfrr_pb0-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrr_pb0-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.ppc64le"
},
"product_reference": "libfrr_pb0-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrr_pb0-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.s390x"
},
"product_reference": "libfrr_pb0-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrr_pb0-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.x86_64"
},
"product_reference": "libfrr_pb0-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrcares0-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrcares0-8.4-7.1.aarch64"
},
"product_reference": "libfrrcares0-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrcares0-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrcares0-8.4-7.1.ppc64le"
},
"product_reference": "libfrrcares0-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrcares0-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrcares0-8.4-7.1.s390x"
},
"product_reference": "libfrrcares0-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrcares0-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrcares0-8.4-7.1.x86_64"
},
"product_reference": "libfrrcares0-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrfpm_pb0-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.aarch64"
},
"product_reference": "libfrrfpm_pb0-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrfpm_pb0-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.ppc64le"
},
"product_reference": "libfrrfpm_pb0-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrfpm_pb0-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.s390x"
},
"product_reference": "libfrrfpm_pb0-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrfpm_pb0-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.x86_64"
},
"product_reference": "libfrrfpm_pb0-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrospfapiclient0-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.aarch64"
},
"product_reference": "libfrrospfapiclient0-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrospfapiclient0-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.ppc64le"
},
"product_reference": "libfrrospfapiclient0-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrospfapiclient0-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.s390x"
},
"product_reference": "libfrrospfapiclient0-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrospfapiclient0-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.x86_64"
},
"product_reference": "libfrrospfapiclient0-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrsnmp0-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.aarch64"
},
"product_reference": "libfrrsnmp0-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrsnmp0-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.ppc64le"
},
"product_reference": "libfrrsnmp0-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrsnmp0-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.s390x"
},
"product_reference": "libfrrsnmp0-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrsnmp0-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.x86_64"
},
"product_reference": "libfrrsnmp0-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrzmq0-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.aarch64"
},
"product_reference": "libfrrzmq0-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrzmq0-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.ppc64le"
},
"product_reference": "libfrrzmq0-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrzmq0-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.s390x"
},
"product_reference": "libfrrzmq0-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfrrzmq0-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.x86_64"
},
"product_reference": "libfrrzmq0-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmlag_pb0-8.4-7.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.aarch64"
},
"product_reference": "libmlag_pb0-8.4-7.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmlag_pb0-8.4-7.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.ppc64le"
},
"product_reference": "libmlag_pb0-8.4-7.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmlag_pb0-8.4-7.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.s390x"
},
"product_reference": "libmlag_pb0-8.4-7.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libmlag_pb0-8.4-7.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.x86_64"
},
"product_reference": "libmlag_pb0-8.4-7.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-46752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-46752"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:frr-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-8.4-7.1.x86_64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-46752",
"url": "https://www.suse.com/security/cve/CVE-2023-46752"
},
{
"category": "external",
"summary": "SUSE Bug 1216627 for CVE-2023-46752",
"url": "https://bugzilla.suse.com/1216627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:frr-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-8.4-7.1.x86_64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:frr-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-8.4-7.1.x86_64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-46752"
},
{
"cve": "CVE-2023-46753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-46753"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:frr-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-8.4-7.1.x86_64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-46753",
"url": "https://www.suse.com/security/cve/CVE-2023-46753"
},
{
"category": "external",
"summary": "SUSE Bug 1216626 for CVE-2023-46753",
"url": "https://bugzilla.suse.com/1216626"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:frr-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-8.4-7.1.x86_64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:frr-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-8.4-7.1.x86_64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.aarch64",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.s390x",
"openSUSE Tumbleweed:frr-devel-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrr_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrcares0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrfpm_pb0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrospfapiclient0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrsnmp0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libfrrzmq0-8.4-7.1.x86_64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.aarch64",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.ppc64le",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.s390x",
"openSUSE Tumbleweed:libmlag_pb0-8.4-7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-46753"
}
]
}
RHSA-2024:2156
Vulnerability from csaf_redhat - Published: 2024-04-30 10:28 - Updated: 2026-03-18 02:26A flaw was found in frr that may allow a remote attacker to cause a denial of service via the bgp_capability_llgr function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch | — |
Vendor Fix
fix
|
A flaw was found in frr that may allow a remote attacker to cause a denial of service via the bgp_attr_psid_sub function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch | — |
Vendor Fix
fix
|
A flaw was found in FRRouting, where it is susceptible to a denial of service vulnerability triggered by a NULL pointer dereference issue during the processing of Network Layer Reachability Information (NLRIs) with a zero attribute length. The vulnerability arises from inadequate validation of user-supplied input in bgpd/bgp_packet.c when handling NLRIs. This flaw allows attackers to send specially crafted input, causing a crash that leads to a denial of service attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch | — |
Vendor Fix
fix
|
A flaw was found in FRRouting that involves a heap-based buffer overflow in the bgp_attr_aigp_valid() function within bgpd/bgp_attr.c. This flaw allows a remote attacker to send specially crafted data to the application, initiating an out-of-bounds read error and executing a denial of service (DoS) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch | — |
Vendor Fix
fix
|
An out-of-bounds read flaw was found in FRRouting in bgpd/bgp_packet.c, resulting from a boundary condition. This flaw allows a remote attacker, through specially crafted input, to read the initial byte of the ORF header in an ahead-of-stream scenario. This attacker can gain information and potentially launch further attacks against the affected system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch | — |
Vendor Fix
fix
|
A flaw was found in frr. Processing a malformed request with no attributes may cause a NULL pointer dereference, resulting in a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch | — |
Vendor Fix
fix
|
A data mishandling vulnerability was found in FRRouting. A malformed MP_REACH_NLRI data can lead to a crash, resulting in a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch | — |
Vendor Fix
fix
Workaround
|
A flaw was found in FRRouting. A crash can occur for a crafted BGP UPDATE message without mandatory attributes (for example, one with only an unknown transit attribute).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch | — |
Vendor Fix
fix
Workaround
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2024:2156 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://access.redhat.com/documentation/en-us/red… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2235839 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2235840 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2235842 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2237416 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2238990 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2238992 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2246379 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2246381 | external |
| https://issues.redhat.com/browse/RHEL-11664 | external |
| https://issues.redhat.com/browse/RHEL-15291 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2023-31489 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2238990 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-31489 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-31489 | external |
| https://access.redhat.com/security/cve/CVE-2023-31490 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2238992 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-31490 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-31490 | external |
| https://access.redhat.com/security/cve/CVE-2023-41358 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2235839 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-41358 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-41358 | external |
| https://github.com/FRRouting/frr/pull/14260 | external |
| https://access.redhat.com/security/cve/CVE-2023-41359 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2235840 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-41359 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-41359 | external |
| https://github.com/FRRouting/frr/pull/14232 | external |
| https://access.redhat.com/security/cve/CVE-2023-41360 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2235842 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-41360 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-41360 | external |
| https://github.com/FRRouting/frr/pull/14245 | external |
| https://access.redhat.com/security/cve/CVE-2023-41909 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2237416 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-41909 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-41909 | external |
| https://access.redhat.com/security/cve/CVE-2023-46752 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2246379 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-46752 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-46752 | external |
| https://github.com/FRRouting/frr/pull/14645/commi… | external |
| https://access.redhat.com/security/cve/CVE-2023-46753 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2246381 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-46753 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-46753 | external |
| https://github.com/FRRouting/frr/pull/14645/commi… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for frr is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD. \n\nSecurity Fix(es):\n\n* frr: incorrect length check in bgp_capability_llgr() can lead do DoS (CVE-2023-31489)\n\n* frr: missing length check in bgp_attr_psid_sub() can lead do DoS (CVE-2023-31490)\n\n* frr: processes invalid NLRIs if attribute length is zero (CVE-2023-41358)\n\n* frr: out of bounds read in bgp_attr_aigp_valid (CVE-2023-41359)\n\n* frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c (CVE-2023-41909)\n\n* frr: mishandled malformed data leading to a crash (CVE-2023-46752)\n\n* frr: crafted BGP UPDATE message leading to a crash (CVE-2023-46753)\n\n* frr: ahead-of-stream read of ORF header (CVE-2023-41360)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2156",
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2235839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235839"
},
{
"category": "external",
"summary": "2235840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235840"
},
{
"category": "external",
"summary": "2235842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235842"
},
{
"category": "external",
"summary": "2237416",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237416"
},
{
"category": "external",
"summary": "2238990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238990"
},
{
"category": "external",
"summary": "2238992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238992"
},
{
"category": "external",
"summary": "2246379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246379"
},
{
"category": "external",
"summary": "2246381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246381"
},
{
"category": "external",
"summary": "RHEL-11664",
"url": "https://issues.redhat.com/browse/RHEL-11664"
},
{
"category": "external",
"summary": "RHEL-15291",
"url": "https://issues.redhat.com/browse/RHEL-15291"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2156.json"
}
],
"title": "Red Hat Security Advisory: frr security update",
"tracking": {
"current_release_date": "2026-03-18T02:26:36+00:00",
"generator": {
"date": "2026-03-18T02:26:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2024:2156",
"initial_release_date": "2024-04-30T10:28:18+00:00",
"revision_history": [
{
"date": "2024-04-30T10:28:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T10:28:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:26:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:8.5.3-4.el9.src",
"product": {
"name": "frr-0:8.5.3-4.el9.src",
"product_id": "frr-0:8.5.3-4.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@8.5.3-4.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:8.5.3-4.el9.aarch64",
"product": {
"name": "frr-0:8.5.3-4.el9.aarch64",
"product_id": "frr-0:8.5.3-4.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@8.5.3-4.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "frr-debugsource-0:8.5.3-4.el9.aarch64",
"product": {
"name": "frr-debugsource-0:8.5.3-4.el9.aarch64",
"product_id": "frr-debugsource-0:8.5.3-4.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debugsource@8.5.3-4.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "frr-debuginfo-0:8.5.3-4.el9.aarch64",
"product": {
"name": "frr-debuginfo-0:8.5.3-4.el9.aarch64",
"product_id": "frr-debuginfo-0:8.5.3-4.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debuginfo@8.5.3-4.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:8.5.3-4.el9.ppc64le",
"product": {
"name": "frr-0:8.5.3-4.el9.ppc64le",
"product_id": "frr-0:8.5.3-4.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@8.5.3-4.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "frr-debugsource-0:8.5.3-4.el9.ppc64le",
"product": {
"name": "frr-debugsource-0:8.5.3-4.el9.ppc64le",
"product_id": "frr-debugsource-0:8.5.3-4.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debugsource@8.5.3-4.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"product": {
"name": "frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"product_id": "frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debuginfo@8.5.3-4.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:8.5.3-4.el9.x86_64",
"product": {
"name": "frr-0:8.5.3-4.el9.x86_64",
"product_id": "frr-0:8.5.3-4.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@8.5.3-4.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "frr-debugsource-0:8.5.3-4.el9.x86_64",
"product": {
"name": "frr-debugsource-0:8.5.3-4.el9.x86_64",
"product_id": "frr-debugsource-0:8.5.3-4.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debugsource@8.5.3-4.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "frr-debuginfo-0:8.5.3-4.el9.x86_64",
"product": {
"name": "frr-debuginfo-0:8.5.3-4.el9.x86_64",
"product_id": "frr-debuginfo-0:8.5.3-4.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debuginfo@8.5.3-4.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:8.5.3-4.el9.s390x",
"product": {
"name": "frr-0:8.5.3-4.el9.s390x",
"product_id": "frr-0:8.5.3-4.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@8.5.3-4.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "frr-debugsource-0:8.5.3-4.el9.s390x",
"product": {
"name": "frr-debugsource-0:8.5.3-4.el9.s390x",
"product_id": "frr-debugsource-0:8.5.3-4.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debugsource@8.5.3-4.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "frr-debuginfo-0:8.5.3-4.el9.s390x",
"product": {
"name": "frr-debuginfo-0:8.5.3-4.el9.s390x",
"product_id": "frr-debuginfo-0:8.5.3-4.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debuginfo@8.5.3-4.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-selinux-0:8.5.3-4.el9.noarch",
"product": {
"name": "frr-selinux-0:8.5.3-4.el9.noarch",
"product_id": "frr-selinux-0:8.5.3-4.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-selinux@8.5.3-4.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:8.5.3-4.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64"
},
"product_reference": "frr-0:8.5.3-4.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:8.5.3-4.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le"
},
"product_reference": "frr-0:8.5.3-4.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:8.5.3-4.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x"
},
"product_reference": "frr-0:8.5.3-4.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:8.5.3-4.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src"
},
"product_reference": "frr-0:8.5.3-4.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:8.5.3-4.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64"
},
"product_reference": "frr-0:8.5.3-4.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debuginfo-0:8.5.3-4.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64"
},
"product_reference": "frr-debuginfo-0:8.5.3-4.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debuginfo-0:8.5.3-4.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le"
},
"product_reference": "frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debuginfo-0:8.5.3-4.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x"
},
"product_reference": "frr-debuginfo-0:8.5.3-4.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debuginfo-0:8.5.3-4.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64"
},
"product_reference": "frr-debuginfo-0:8.5.3-4.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debugsource-0:8.5.3-4.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64"
},
"product_reference": "frr-debugsource-0:8.5.3-4.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debugsource-0:8.5.3-4.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le"
},
"product_reference": "frr-debugsource-0:8.5.3-4.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debugsource-0:8.5.3-4.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x"
},
"product_reference": "frr-debugsource-0:8.5.3-4.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debugsource-0:8.5.3-4.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64"
},
"product_reference": "frr-debugsource-0:8.5.3-4.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-selinux-0:8.5.3-4.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
},
"product_reference": "frr-selinux-0:8.5.3-4.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-31489",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238990"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in frr that may allow a remote attacker to cause a denial of service via the bgp_capability_llgr function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: incorrect length check in bgp_capability_llgr() can lead do DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-31489"
},
{
"category": "external",
"summary": "RHBZ#2238990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238990"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-31489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-31489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31489"
}
],
"release_date": "2023-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:28:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: incorrect length check in bgp_capability_llgr() can lead do DoS"
},
{
"cve": "CVE-2023-31490",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238992"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in frr that may allow a remote attacker to cause a denial of service via the bgp_attr_psid_sub function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: missing length check in bgp_attr_psid_sub() can lead do DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-31490"
},
{
"category": "external",
"summary": "RHBZ#2238992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-31490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-31490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31490"
}
],
"release_date": "2023-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:28:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: missing length check in bgp_attr_psid_sub() can lead do DoS"
},
{
"cve": "CVE-2023-41358",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2235839"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FRRouting, where it is susceptible to a denial of service vulnerability triggered by a NULL pointer dereference issue during the processing of Network Layer Reachability Information (NLRIs) with a zero attribute length. The vulnerability arises from inadequate validation of user-supplied input in bgpd/bgp_packet.c when handling NLRIs. This flaw allows attackers to send specially crafted input, causing a crash that leads to a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: processes invalid NLRIs if attribute length is zero",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41358"
},
{
"category": "external",
"summary": "RHBZ#2235839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235839"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41358",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41358"
},
{
"category": "external",
"summary": "https://github.com/FRRouting/frr/pull/14260",
"url": "https://github.com/FRRouting/frr/pull/14260"
}
],
"release_date": "2023-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:28:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: processes invalid NLRIs if attribute length is zero"
},
{
"cve": "CVE-2023-41359",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2235840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FRRouting that involves a heap-based buffer overflow in the bgp_attr_aigp_valid() function within bgpd/bgp_attr.c. This flaw allows a remote attacker to send specially crafted data to the application, initiating an out-of-bounds read error and executing a denial of service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: out of bounds read in bgp_attr_aigp_valid",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Enterprise Linux 8, the vulnerable code is not included. It was added in FRR-8.5 in upstream. The highest version of FRR utilized in RHEL-8 is 7.5. Hence, versions of FRR shipped with RHEL-8 are not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41359"
},
{
"category": "external",
"summary": "RHBZ#2235840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41359"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41359",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41359"
},
{
"category": "external",
"summary": "https://github.com/FRRouting/frr/pull/14232",
"url": "https://github.com/FRRouting/frr/pull/14232"
}
],
"release_date": "2023-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:28:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: out of bounds read in bgp_attr_aigp_valid"
},
{
"cve": "CVE-2023-41360",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2235842"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in FRRouting in bgpd/bgp_packet.c, resulting from a boundary condition. This flaw allows a remote attacker, through specially crafted input, to read the initial byte of the ORF header in an ahead-of-stream scenario. This attacker can gain information and potentially launch further attacks against the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: ahead-of-stream read of ORF header",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat Enterprise Linux 8, the vulnerable code is not included. It was added in FRR-8.4 in upstream. The highest version of FRR utilized in RHEL-8 is 7.5. Hence, versions of FRR shipped with RHEL-8 are not affected by this vulnerability.\n\nRed Hat Product Security rated this vulnerability as a LOW security impact because it only exposes the initial byte of the ORF header in an ahead-of-stream situation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41360"
},
{
"category": "external",
"summary": "RHBZ#2235842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41360"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41360",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41360"
},
{
"category": "external",
"summary": "https://github.com/FRRouting/frr/pull/14245",
"url": "https://github.com/FRRouting/frr/pull/14245"
}
],
"release_date": "2023-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:28:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "frr: ahead-of-stream read of ORF header"
},
{
"cve": "CVE-2023-41909",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237416"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in frr. Processing a malformed request with no attributes may cause a NULL pointer dereference, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41909"
},
{
"category": "external",
"summary": "RHBZ#2237416",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237416"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41909"
}
],
"release_date": "2023-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:28:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c"
},
{
"cve": "CVE-2023-46752",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246379"
}
],
"notes": [
{
"category": "description",
"text": "A data mishandling vulnerability was found in FRRouting. A malformed MP_REACH_NLRI data can lead to a crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: mishandled malformed data leading to a crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46752"
},
{
"category": "external",
"summary": "RHBZ#2246379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46752"
},
{
"category": "external",
"summary": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35",
"url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35"
}
],
"release_date": "2023-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:28:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: mishandled malformed data leading to a crash"
},
{
"cve": "CVE-2023-46753",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246381"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FRRouting. A crash can occur for a crafted BGP UPDATE message without mandatory attributes (for example, one with only an unknown transit attribute).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: crafted BGP UPDATE message leading to a crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46753"
},
{
"category": "external",
"summary": "RHBZ#2246381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46753"
},
{
"category": "external",
"summary": "https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9",
"url": "https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9"
}
],
"release_date": "2023-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T10:28:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2156"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.src",
"AppStream-9.4.0.GA:frr-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debuginfo-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.aarch64",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.ppc64le",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.s390x",
"AppStream-9.4.0.GA:frr-debugsource-0:8.5.3-4.el9.x86_64",
"AppStream-9.4.0.GA:frr-selinux-0:8.5.3-4.el9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: crafted BGP UPDATE message leading to a crash"
}
]
}
RHSA-2024:2981
Vulnerability from csaf_redhat - Published: 2024-05-22 10:06 - Updated: 2026-03-18 02:26A flaw was found in frr that may allow a remote attacker to cause a denial of service via the bgp_attr_psid_sub function.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch | — |
Vendor Fix
fix
|
A flaw was found in FRRouting, where it is susceptible to a denial of service vulnerability triggered by a NULL pointer dereference issue during the processing of Network Layer Reachability Information (NLRIs) with a zero attribute length. The vulnerability arises from inadequate validation of user-supplied input in bgpd/bgp_packet.c when handling NLRIs. This flaw allows attackers to send specially crafted input, causing a crash that leads to a denial of service attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch | — |
Vendor Fix
fix
|
A flaw was found in frr. Processing a malformed request with no attributes may cause a NULL pointer dereference, resulting in a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch | — |
Vendor Fix
fix
|
A data mishandling vulnerability was found in FRRouting. A malformed MP_REACH_NLRI data can lead to a crash, resulting in a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch | — |
Vendor Fix
fix
Workaround
|
A flaw was found in FRRouting. A crash can occur for a crafted BGP UPDATE message without mandatory attributes (for example, one with only an unknown transit attribute).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch | — |
Vendor Fix
fix
Workaround
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2024:2981 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://access.redhat.com/documentation/en-us/red… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2235839 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2237416 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2238992 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2246379 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2246381 | external |
| https://issues.redhat.com/browse/RHEL-12039 | external |
| https://issues.redhat.com/browse/RHEL-22303 | external |
| https://issues.redhat.com/browse/RHEL-2263 | external |
| https://issues.redhat.com/browse/RHEL-6583 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2023-31490 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2238992 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-31490 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-31490 | external |
| https://access.redhat.com/security/cve/CVE-2023-41358 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2235839 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-41358 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-41358 | external |
| https://github.com/FRRouting/frr/pull/14260 | external |
| https://access.redhat.com/security/cve/CVE-2023-41909 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2237416 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-41909 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-41909 | external |
| https://access.redhat.com/security/cve/CVE-2023-46752 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2246379 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-46752 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-46752 | external |
| https://github.com/FRRouting/frr/pull/14645/commi… | external |
| https://access.redhat.com/security/cve/CVE-2023-46753 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2246381 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-46753 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-46753 | external |
| https://github.com/FRRouting/frr/pull/14645/commi… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for frr is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD. \n\nSecurity Fix(es):\n\n* frr: missing length check in bgp_attr_psid_sub() can lead do DoS (CVE-2023-31490)\n\n* frr: processes invalid NLRIs if attribute length is zero (CVE-2023-41358)\n\n* frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c (CVE-2023-41909)\n\n* frr: mishandled malformed data leading to a crash (CVE-2023-46752)\n\n* frr: crafted BGP UPDATE message leading to a crash (CVE-2023-46753)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2981",
"url": "https://access.redhat.com/errata/RHSA-2024:2981"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
},
{
"category": "external",
"summary": "2235839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235839"
},
{
"category": "external",
"summary": "2237416",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237416"
},
{
"category": "external",
"summary": "2238992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238992"
},
{
"category": "external",
"summary": "2246379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246379"
},
{
"category": "external",
"summary": "2246381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246381"
},
{
"category": "external",
"summary": "RHEL-12039",
"url": "https://issues.redhat.com/browse/RHEL-12039"
},
{
"category": "external",
"summary": "RHEL-22303",
"url": "https://issues.redhat.com/browse/RHEL-22303"
},
{
"category": "external",
"summary": "RHEL-2263",
"url": "https://issues.redhat.com/browse/RHEL-2263"
},
{
"category": "external",
"summary": "RHEL-6583",
"url": "https://issues.redhat.com/browse/RHEL-6583"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2981.json"
}
],
"title": "Red Hat Security Advisory: frr security update",
"tracking": {
"current_release_date": "2026-03-18T02:26:35+00:00",
"generator": {
"date": "2026-03-18T02:26:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2024:2981",
"initial_release_date": "2024-05-22T10:06:03+00:00",
"revision_history": [
{
"date": "2024-05-22T10:06:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-22T10:06:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T02:26:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:7.5.1-22.el8.src",
"product": {
"name": "frr-0:7.5.1-22.el8.src",
"product_id": "frr-0:7.5.1-22.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@7.5.1-22.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:7.5.1-22.el8.aarch64",
"product": {
"name": "frr-0:7.5.1-22.el8.aarch64",
"product_id": "frr-0:7.5.1-22.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@7.5.1-22.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "frr-debugsource-0:7.5.1-22.el8.aarch64",
"product": {
"name": "frr-debugsource-0:7.5.1-22.el8.aarch64",
"product_id": "frr-debugsource-0:7.5.1-22.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debugsource@7.5.1-22.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "frr-debuginfo-0:7.5.1-22.el8.aarch64",
"product": {
"name": "frr-debuginfo-0:7.5.1-22.el8.aarch64",
"product_id": "frr-debuginfo-0:7.5.1-22.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debuginfo@7.5.1-22.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:7.5.1-22.el8.ppc64le",
"product": {
"name": "frr-0:7.5.1-22.el8.ppc64le",
"product_id": "frr-0:7.5.1-22.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@7.5.1-22.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "frr-debugsource-0:7.5.1-22.el8.ppc64le",
"product": {
"name": "frr-debugsource-0:7.5.1-22.el8.ppc64le",
"product_id": "frr-debugsource-0:7.5.1-22.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debugsource@7.5.1-22.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"product": {
"name": "frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"product_id": "frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debuginfo@7.5.1-22.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:7.5.1-22.el8.x86_64",
"product": {
"name": "frr-0:7.5.1-22.el8.x86_64",
"product_id": "frr-0:7.5.1-22.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@7.5.1-22.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "frr-debugsource-0:7.5.1-22.el8.x86_64",
"product": {
"name": "frr-debugsource-0:7.5.1-22.el8.x86_64",
"product_id": "frr-debugsource-0:7.5.1-22.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debugsource@7.5.1-22.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "frr-debuginfo-0:7.5.1-22.el8.x86_64",
"product": {
"name": "frr-debuginfo-0:7.5.1-22.el8.x86_64",
"product_id": "frr-debuginfo-0:7.5.1-22.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debuginfo@7.5.1-22.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-0:7.5.1-22.el8.s390x",
"product": {
"name": "frr-0:7.5.1-22.el8.s390x",
"product_id": "frr-0:7.5.1-22.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr@7.5.1-22.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "frr-debugsource-0:7.5.1-22.el8.s390x",
"product": {
"name": "frr-debugsource-0:7.5.1-22.el8.s390x",
"product_id": "frr-debugsource-0:7.5.1-22.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debugsource@7.5.1-22.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "frr-debuginfo-0:7.5.1-22.el8.s390x",
"product": {
"name": "frr-debuginfo-0:7.5.1-22.el8.s390x",
"product_id": "frr-debuginfo-0:7.5.1-22.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-debuginfo@7.5.1-22.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "frr-selinux-0:7.5.1-22.el8.noarch",
"product": {
"name": "frr-selinux-0:7.5.1-22.el8.noarch",
"product_id": "frr-selinux-0:7.5.1-22.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/frr-selinux@7.5.1-22.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:7.5.1-22.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64"
},
"product_reference": "frr-0:7.5.1-22.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:7.5.1-22.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le"
},
"product_reference": "frr-0:7.5.1-22.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:7.5.1-22.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x"
},
"product_reference": "frr-0:7.5.1-22.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:7.5.1-22.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src"
},
"product_reference": "frr-0:7.5.1-22.el8.src",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-0:7.5.1-22.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64"
},
"product_reference": "frr-0:7.5.1-22.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debuginfo-0:7.5.1-22.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64"
},
"product_reference": "frr-debuginfo-0:7.5.1-22.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debuginfo-0:7.5.1-22.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le"
},
"product_reference": "frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debuginfo-0:7.5.1-22.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x"
},
"product_reference": "frr-debuginfo-0:7.5.1-22.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debuginfo-0:7.5.1-22.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64"
},
"product_reference": "frr-debuginfo-0:7.5.1-22.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debugsource-0:7.5.1-22.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64"
},
"product_reference": "frr-debugsource-0:7.5.1-22.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debugsource-0:7.5.1-22.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le"
},
"product_reference": "frr-debugsource-0:7.5.1-22.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debugsource-0:7.5.1-22.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x"
},
"product_reference": "frr-debugsource-0:7.5.1-22.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-debugsource-0:7.5.1-22.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64"
},
"product_reference": "frr-debugsource-0:7.5.1-22.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "frr-selinux-0:7.5.1-22.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
},
"product_reference": "frr-selinux-0:7.5.1-22.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-31490",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238992"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in frr that may allow a remote attacker to cause a denial of service via the bgp_attr_psid_sub function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: missing length check in bgp_attr_psid_sub() can lead do DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-31490"
},
{
"category": "external",
"summary": "RHBZ#2238992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-31490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-31490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31490"
}
],
"release_date": "2023-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:06:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2981"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: missing length check in bgp_attr_psid_sub() can lead do DoS"
},
{
"cve": "CVE-2023-41358",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2235839"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FRRouting, where it is susceptible to a denial of service vulnerability triggered by a NULL pointer dereference issue during the processing of Network Layer Reachability Information (NLRIs) with a zero attribute length. The vulnerability arises from inadequate validation of user-supplied input in bgpd/bgp_packet.c when handling NLRIs. This flaw allows attackers to send specially crafted input, causing a crash that leads to a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: processes invalid NLRIs if attribute length is zero",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41358"
},
{
"category": "external",
"summary": "RHBZ#2235839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235839"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41358",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41358"
},
{
"category": "external",
"summary": "https://github.com/FRRouting/frr/pull/14260",
"url": "https://github.com/FRRouting/frr/pull/14260"
}
],
"release_date": "2023-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:06:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2981"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: processes invalid NLRIs if attribute length is zero"
},
{
"cve": "CVE-2023-41909",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237416"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in frr. Processing a malformed request with no attributes may cause a NULL pointer dereference, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41909"
},
{
"category": "external",
"summary": "RHBZ#2237416",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237416"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41909"
}
],
"release_date": "2023-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:06:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2981"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c"
},
{
"cve": "CVE-2023-46752",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246379"
}
],
"notes": [
{
"category": "description",
"text": "A data mishandling vulnerability was found in FRRouting. A malformed MP_REACH_NLRI data can lead to a crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: mishandled malformed data leading to a crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46752"
},
{
"category": "external",
"summary": "RHBZ#2246379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46752"
},
{
"category": "external",
"summary": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35",
"url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35"
}
],
"release_date": "2023-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:06:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2981"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: mishandled malformed data leading to a crash"
},
{
"cve": "CVE-2023-46753",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246381"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in FRRouting. A crash can occur for a crafted BGP UPDATE message without mandatory attributes (for example, one with only an unknown transit attribute).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "frr: crafted BGP UPDATE message leading to a crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46753"
},
{
"category": "external",
"summary": "RHBZ#2246381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46753"
},
{
"category": "external",
"summary": "https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9",
"url": "https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9"
}
],
"release_date": "2023-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T10:06:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2981"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.src",
"AppStream-8.10.0.GA:frr-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debuginfo-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.aarch64",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.ppc64le",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.s390x",
"AppStream-8.10.0.GA:frr-debugsource-0:7.5.1-22.el8.x86_64",
"AppStream-8.10.0.GA:frr-selinux-0:7.5.1-22.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "frr: crafted BGP UPDATE message leading to a crash"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.