First published: Tue Apr 30 2024(Updated: )
In FRRouting (FRR) through 9.1, it is possible for the get_edge() function in ospf_te.c in the OSPF daemon to return a NULL pointer. In cases where calling functions do not handle the returned NULL value, the OSPF daemon crashes, leading to denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/frr | <=8.4.4-1.1~deb12u1 | 7.5.1-1.1+deb11u2 7.5.1-1.1+deb11u4 10.2.1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34088 has a severity level that could lead to a denial of service due to the OSPF daemon crashing.
To fix CVE-2024-34088, it is recommended to update to the patched versions of frr: 7.5.1-1.1+deb11u2, 7.5.1-1.1+deb11u4, or 10.2.1-2.
CVE-2024-34088 affects the FRRouting (FRR) software, specifically versions up to 8.4.4-1.1~deb12u1.
The vulnerability in CVE-2024-34088 is caused by the get_edge() function in ospf_te.c returning a NULL pointer that is not handled properly.
The potential consequence of CVE-2024-34088 is a denial of service, leading to the crash of the OSPF daemon.