First published: Mon Feb 26 2024(Updated: )
Due to a mistake in error checking, Routinator will terminate when an incoming RTR connection is reset by the peer too quickly after opening.
Credit: sep@nlnetlabs.nl
Affected Software | Affected Version | How to fix |
---|---|---|
NLnet Labs Routinator | ||
NLnet Labs Routinator | <0.13.2 | |
Fedora | =38 | |
Fedora | =39 | |
Fedora | =40 |
This issue is fixed in 0.13.2 and all later versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-1622 is considered moderate due to its potential to cause service interruptions.
To fix CVE-2024-1622, you should update your NLnet Labs Routinator to the latest version that contains the necessary patches.
CVE-2024-1622 affects all versions of NLnet Labs Routinator prior to the patch release addressing this vulnerability.
Yes, CVE-2024-1622 can potentially lead to Denial of Service as it causes Routinator to terminate unexpectedly.
While CVE-2024-1622 is not directly a security breach, its impact on service uptime poses operational risks.