frr-8.5.3-4.el9
エラータID: AXSA:2024-7889:04
FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD.
Security Fix(es):
* frr: incorrect length check in bgp_capability_llgr() can lead do DoS (CVE-2023-31489)
* frr: missing length check in bgp_attr_psid_sub() can lead do DoS (CVE-2023-31490)
* frr: processes invalid NLRIs if attribute length is zero (CVE-2023-41358)
* frr: out of bounds read in bgp_attr_aigp_valid (CVE-2023-41359)
* frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c (CVE-2023-41909)
* frr: mishandled malformed data leading to a crash (CVE-2023-46752)
* frr: crafted BGP UPDATE message leading to a crash (CVE-2023-46753)
* frr: ahead-of-stream read of ORF header (CVE-2023-41360)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the MIRACLE LINUX 9.4 Release Notes linked from the References section.
CVE-2023-31489
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function.
CVE-2023-31490
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function.
CVE-2023-41358
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.
CVE-2023-41359
An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation.
CVE-2023-41360
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.
CVE-2023-41909
An issue was discovered in FRRouting FRR through 9.0. bgp_nlri_parse_flowspec in bgpd/bgp_flowspec.c processes malformed requests with no attributes, leading to a NULL pointer dereference.
CVE-2023-46752
An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.
CVE-2023-46753
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.
Update packages.
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function.
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function.
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.
An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation.
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.
An issue was discovered in FRRouting FRR through 9.0. bgp_nlri_parse_flowspec in bgpd/bgp_flowspec.c processes malformed requests with no attributes, leading to a NULL pointer dereference.
An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.
N/A
SRPMS
- frr-8.5.3-4.el9.src.rpm
MD5: d21975b1409ee69d3d5dba49b796b53e
SHA-256: 258c753f8315ae56817fed0f872ccb392fb02546b88b7d1bd2442a1844431beb
Size: 9.44 MB
Asianux Server 9 for x86_64
- frr-8.5.3-4.el9.x86_64.rpm
MD5: 75c689d71d92c2fc31b18588c88af779
SHA-256: 9a9f214dd7e3fc7f276bc3322e6bb33e5f7f8f51008ea44455f99467d37a17eb
Size: 4.77 MB - frr-selinux-8.5.3-4.el9.noarch.rpm
MD5: 3c2715bcb59cb50a501c9cc41f965a8c
SHA-256: d4e143904b19b9ec05c5401d41bd9bfa3a21a2f85bf4a65a58c13129392d2ca0
Size: 25.13 kB