First published: Thu Mar 03 2022(Updated: )
Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv length in the functions, parse_hello_subtlv, parse_ihu_subtlv, and parse_update_subtlv in babeld/message.c.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Frrouting Frrouting | <=8.1 | |
debian/frr | <=7.5.1-1.1+deb11u2 | 7.5.1-1.1+deb11u3 8.4.4-1.1~deb12u1 10.1.1-0.1 10.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26129 is a vulnerability that exists in FRRouting through version 8.1.0.
CVE-2022-26129 has a severity score of 7.8 (high).
CVE-2022-26129 causes buffer overflow vulnerabilities due to incorrect checks on the subtlv length in certain functions in babeld/message.c.
FRRouting versions up to and including 8.1.0 are affected by CVE-2022-26129.
To fix CVE-2022-26129 in FRRouting, you should update to version 8.4.4-1.1 or later. If you are using the Debian package, update to version 6.0.2-2+deb10u1, 7.5.1-1.1+deb10u1, or 7.5.1-1.1+deb11u2.