An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "frr",
"binary_version": "7.2.1-1ubuntu0.2"
},
{
"binary_name": "frr-dbgsym",
"binary_version": "7.2.1-1ubuntu0.2"
},
{
"binary_name": "frr-doc",
"binary_version": "7.2.1-1ubuntu0.2"
},
{
"binary_name": "frr-pythontools",
"binary_version": "7.2.1-1ubuntu0.2"
},
{
"binary_name": "frr-rpki-rtrlib",
"binary_version": "7.2.1-1ubuntu0.2"
},
{
"binary_name": "frr-rpki-rtrlib-dbgsym",
"binary_version": "7.2.1-1ubuntu0.2"
},
{
"binary_name": "frr-snmp",
"binary_version": "7.2.1-1ubuntu0.2"
},
{
"binary_name": "frr-snmp-dbgsym",
"binary_version": "7.2.1-1ubuntu0.2"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "frr",
"binary_version": "8.1-1ubuntu1.3"
},
{
"binary_name": "frr-dbgsym",
"binary_version": "8.1-1ubuntu1.3"
},
{
"binary_name": "frr-doc",
"binary_version": "8.1-1ubuntu1.3"
},
{
"binary_name": "frr-pythontools",
"binary_version": "8.1-1ubuntu1.3"
},
{
"binary_name": "frr-rpki-rtrlib",
"binary_version": "8.1-1ubuntu1.3"
},
{
"binary_name": "frr-rpki-rtrlib-dbgsym",
"binary_version": "8.1-1ubuntu1.3"
},
{
"binary_name": "frr-snmp",
"binary_version": "8.1-1ubuntu1.3"
},
{
"binary_name": "frr-snmp-dbgsym",
"binary_version": "8.1-1ubuntu1.3"
}
]
}