First published: Thu Mar 03 2022(Updated: )
Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the input packet length in isisd/isis_tlvs.c.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Frrouting Frrouting | <=8.1 | |
debian/frr | <=6.0.2-2+deb10u1<=7.5.1-1.1+deb10u1<=7.5.1-1.1+deb11u2 | 8.4.4-1.1~deb12u1 8.4.4-1.1 |
<=8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26125 is a vulnerability in FRRouting that allows buffer overflow due to incorrect input packet length checks.
CVE-2022-26125 has a severity rating of 7.8 (high).
CVE-2022-26125 can lead to buffer overflow vulnerabilities in FRRouting versions up to 8.1.0.
Yes, a fix is available for CVE-2022-26125 in FRRouting version 8.4.4-1.1~deb12u1 and later.
You can find more information about CVE-2022-26125 on the GitHub issue (https://github.com/FRRouting/frr/issues/10507) and the Debian security tracker (https://security-tracker.debian.org/tracker/CVE-2022-26125).