First published: Sun Apr 07 2024(Updated: )
In FRRouting (FRR) through 9.1, there can be a buffer overflow and daemon crash in ospf_te_parse_ri for OSPF LSA packets during an attempt to read Segment Routing subTLVs (their size is not validated).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/frr | <=8.4.4-1.1~deb12u1 | 7.5.1-1.1+deb11u2 7.5.1-1.1+deb11u4 10.2.1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31950 has been classified as a high severity vulnerability due to the potential for remote crashes and denial of service.
To mitigate CVE-2024-31950, upgrade to versions 7.5.1-1.1+deb11u2, 7.5.1-1.1+deb11u4, or 10.2.1-2 of the frr package.
CVE-2024-31950 is caused by a buffer overflow in FRRouting caused by unsafe handling of OSPF LSA packets.
CVE-2024-31950 affects FRRouting versions up to and including 8.4.4-1.1~deb12u1.
As of now, there is no public information available regarding a known exploit for CVE-2024-31950.