First published: Tue Mar 05 2024(Updated: )
FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD. <br>Security Fix(es):<br><li> ffr: Flowspec overflow in bgpd/bgp_flowspec.c (CVE-2023-38406)</li> <li> ffr: Out of bounds read in bgpd/bgp_label.c (CVE-2023-38407)</li> <li> frr: crash from specially crafted MP_UNREACH_NLRI-containing BGP UPDATE message (CVE-2023-47234)</li> <li> frr: crash from malformed EOR-containing BGP UPDATE message (CVE-2023-47235)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/frr | <8.0-5.el9_0.3 | 8.0-5.el9_0.3 |
redhat/frr | <8.0-5.el9_0.3 | 8.0-5.el9_0.3 |
redhat/frr-debuginfo | <8.0-5.el9_0.3 | 8.0-5.el9_0.3 |
redhat/frr-debugsource | <8.0-5.el9_0.3 | 8.0-5.el9_0.3 |
redhat/frr-debuginfo | <8.0-5.el9_0.3 | 8.0-5.el9_0.3 |
redhat/frr-debugsource | <8.0-5.el9_0.3 | 8.0-5.el9_0.3 |
redhat/frr | <8.0-5.el9_0.3 | 8.0-5.el9_0.3 |
redhat/frr-debuginfo | <8.0-5.el9_0.3 | 8.0-5.el9_0.3 |
redhat/frr-debugsource | <8.0-5.el9_0.3 | 8.0-5.el9_0.3 |
redhat/frr | <8.0-5.el9_0.3.aa | 8.0-5.el9_0.3.aa |
redhat/frr-debuginfo | <8.0-5.el9_0.3.aa | 8.0-5.el9_0.3.aa |
redhat/frr-debugsource | <8.0-5.el9_0.3.aa | 8.0-5.el9_0.3.aa |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for ARM64 EUS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1152 is categorized as important due to potential security vulnerabilities in the FRRouting package.
To fix RHSA-2024:1152, update your FRRouting package to version 8.0-5.el9_0.3 or later.
RHSA-2024:1152 addresses a flowspec overflow vulnerability (CVE-2023-38406) and an out-of-bounds read issue in FRRouting.
RHSA-2024:1152 affects FRRouting versions prior to 8.0-5.el9_0.3 across various architectures.
FRRouting is maintained by Red Hat and is part of their open-source TCP/IP routing software offerings.