SB2024112867 - SUSE update for frr 



SB2024112867 - SUSE update for frr

Published: November 28, 2024

Security Bulletin ID SB2024112867
Severity
Medium
Patch available
YES
Number of vulnerabilities 19
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 19 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2023-31489)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the bgp_capability_llgr() function in bgpd. A remote attacker can pass specially crafted input to the sevrer and perform a denial of service (DoS) attack.


2) Input validation error (CVE-ID: CVE-2023-31490)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the bgp_attr_psid_sub() function in bgpd. A remote attacker can pass specially crafted input to the server and perform a denial of service (DoS) attack.


3) Infinite loop (CVE-ID: CVE-2023-3748)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when processing hello messages. A remote attacker can send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to consume all available system resources and cause denial of service conditions.


4) Input validation error (CVE-ID: CVE-2023-38406)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in bgpd/bgp_flowspec.c. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.


5) Out-of-bounds read (CVE-ID: CVE-2023-38407)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition during labeled unicast parsing in bgpd/bgp_label.c. A remote attacker can send specially crafted input to the application, trigger an out-of-bounds read error and crash the daemon.


6) Input validation error (CVE-ID: CVE-2023-38802)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing BGP update data with a corrupted attribute 23 (Tunnel Encapsulation). A remote attacker can send specially crafted BGP update data to the application and perform a denial of service (DoS) attack.


7) Input validation error (CVE-ID: CVE-2023-41358)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in bgpd/bgp_packet.c when handling NLRIs. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.


8) Out-of-bounds read (CVE-ID: CVE-2023-41360)

The vulnerability allows a remote attacker to gain access to potentially sensitive information or perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in bgpd/bgp_packet.c. A remote attacker can read the initial byte of the ORF header in an ahead-of-stream situation.


9) NULL pointer dereference (CVE-ID: CVE-2023-41909)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the bgp_nlri_parse_flowspec() function in bgpd/bgp_flowspec.c. A remote attacker can send specially crafted data to the application and perform a denial of service (DoS) attack.


10) Input validation error (CVE-ID: CVE-2023-46752)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing MP_REACH_NLRI data. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.


11) Input validation error (CVE-ID: CVE-2023-46753)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing BGP UPDATE message without mandatory attributes. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.


12) Input validation error (CVE-ID: CVE-2023-47234)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes). A remote attacker can send specially crafted messages to the daemon and perform a denial of service (DoS) attack.


13) Input validation error (CVE-ID: CVE-2023-47235)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when a malformed BGP UPDATE message with an EOR is processed. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.


14) Input validation error (CVE-ID: CVE-2024-27913)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of OSPF LSA packets within the ospf_te_parse_te() function in ospfd/ospf_te.c. A remote attacker can send specially crafted packets to the server and crash the ospfd daemon.


15) Buffer overflow (CVE-ID: CVE-2024-31948)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when parsing Prefix SID attribute in a BGP UPDATE packet. A remote attacker can send specially crafted packets to the application, trigger memory corruption and crash the bgpd daemon.


16) Buffer overflow (CVE-ID: CVE-2024-31950)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in ospf_te_parse_ri when parsing OSPF LSA packets. A remote attacker can send specially crafted packets to the system, trigger memory corruption and perform a denial of service (DoS) attack.


17) Buffer overflow (CVE-ID: CVE-2024-31951)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in ospf_te_parse_ext_link when parsing OSPF LSA packets. A remote attacker can send specially crafted packets to the daemon, trigger memory corruption and perform a denial of service (DoS) attack.


18) NULL pointer dereference (CVE-ID: CVE-2024-34088)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the get_edge() function in ospf_te.c. A remote attacker can send specially crafted packets to the daemon and perform a denial of service (DoS) attack.


19) Input validation error (CVE-ID: CVE-2024-44070)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the bgp_attr_encap() function in bgpd/bgp_attr.c. A remote attacker can send specially crafted BGP traffic to the daemon and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.