First published: Tue May 28 2024(Updated: )
It was discovered that FRR incorrectly handled certain malformed BGP and OSPF packets. A remote attacker could use this issue to cause FRR to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/frr | <8.4.4-1.1ubuntu6.1 | 8.4.4-1.1ubuntu6.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/frr | <8.4.4-1.1ubuntu1.4 | 8.4.4-1.1ubuntu1.4 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/frr | <8.1-1ubuntu1.10 | 8.1-1ubuntu1.10 |
Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-6794-1 is classified as a high severity vulnerability due to the potential for denial of service and arbitrary code execution.
To fix USN-6794-1, upgrade to one of the patched versions of the FRR package specified in the advisory.
USN-6794-1 affects Ubuntu versions 24.04, 23.10, and 22.04 with specific FRR versions.
While USN-6794-1 primarily results in denial of service, there is a risk of unauthorized access that could potentially lead to a data breach.
No specific workarounds are recommended for USN-6794-1; patching the FRR software is the best mitigation.