First published: Wed Oct 18 2023(Updated: )
It was discovered that the FRR did not properly check the attribute length in NRLI. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-41358) It was discovered that the FRR did not properly manage memory when reading initial bytes of ORF header. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-41360) It was discovered that FRR did not properly validate the attributes in the BGP FlowSpec functionality. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2023-41909)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/frr | <8.4.2-1ubuntu1.4 | 8.4.2-1ubuntu1.4 |
=23.04 | ||
All of | ||
ubuntu/frr | <8.1-1ubuntu1.6 | 8.1-1ubuntu1.6 |
=22.04 | ||
All of | ||
ubuntu/frr | <7.2.1-1ubuntu0.2+esm1 | 7.2.1-1ubuntu0.2+esm1 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for USN-6436-1 is CVE-2023-41358.
The severity of CVE-2023-41358 is not mentioned in the provided information. Please refer to the official security advisory for more details.
A remote attacker can exploit CVE-2023-41358 by using the FRR's improper attribute length check in NRLI to cause a denial of service.
The FRR package versions 8.4.2-1ubuntu1.4, 8.1-1ubuntu1.6, and 7.2.1-1ubuntu0.2+esm1 are affected by USN-6436-1.
To remediate the FRR vulnerabilities, update your FRR package to the recommended versions provided by the vendor.