SB2024112867 - SUSE update for frr
Published: November 28, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 19 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2023-31489)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the bgp_capability_llgr() function in bgpd. A remote attacker can pass specially crafted input to the sevrer and perform a denial of service (DoS) attack.
2) Input validation error (CVE-ID: CVE-2023-31490)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the bgp_attr_psid_sub() function in bgpd. A remote attacker can pass specially crafted input to the server and perform a denial of service (DoS) attack.
3) Infinite loop (CVE-ID: CVE-2023-3748)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when processing hello messages. A remote attacker can send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to consume all available system resources and cause denial of service conditions.
4) Input validation error (CVE-ID: CVE-2023-38406)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in bgpd/bgp_flowspec.c. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.
5) Out-of-bounds read (CVE-ID: CVE-2023-38407)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition during labeled unicast parsing in bgpd/bgp_label.c. A remote attacker can send specially crafted input to the application, trigger an out-of-bounds read error and crash the daemon.
6) Input validation error (CVE-ID: CVE-2023-38802)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing BGP update data with a corrupted attribute 23 (Tunnel Encapsulation). A remote attacker can send specially crafted BGP update data to the application and perform a denial of service (DoS) attack.
7) Input validation error (CVE-ID: CVE-2023-41358)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in bgpd/bgp_packet.c when handling NLRIs. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.
8) Out-of-bounds read (CVE-ID: CVE-2023-41360)
The vulnerability allows a remote attacker to gain access to potentially sensitive information or perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in bgpd/bgp_packet.c. A remote attacker can read the initial byte of the ORF header in an ahead-of-stream situation.
9) NULL pointer dereference (CVE-ID: CVE-2023-41909)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the bgp_nlri_parse_flowspec() function in bgpd/bgp_flowspec.c. A remote attacker can send specially crafted data to the application and perform a denial of service (DoS) attack.
10) Input validation error (CVE-ID: CVE-2023-46752)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing MP_REACH_NLRI data. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.
11) Input validation error (CVE-ID: CVE-2023-46753)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing BGP UPDATE message without mandatory attributes. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.
12) Input validation error (CVE-ID: CVE-2023-47234)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes). A remote attacker can send specially crafted messages to the daemon and perform a denial of service (DoS) attack.
13) Input validation error (CVE-ID: CVE-2023-47235)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when a malformed BGP UPDATE message with an EOR is processed. A remote attacker can send specially crafted input to the application and perform a denial of service (DoS) attack.
14) Input validation error (CVE-ID: CVE-2024-27913)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of OSPF LSA packets within the ospf_te_parse_te() function in ospfd/ospf_te.c. A remote attacker can send specially crafted packets to the server and crash the ospfd daemon.
15) Buffer overflow (CVE-ID: CVE-2024-31948)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when parsing Prefix SID attribute in a BGP UPDATE packet. A remote attacker can send specially crafted packets to the application, trigger memory corruption and crash the bgpd daemon.
16) Buffer overflow (CVE-ID: CVE-2024-31950)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in ospf_te_parse_ri when parsing OSPF LSA packets. A remote attacker can send specially crafted packets to the system, trigger memory corruption and perform a denial of service (DoS) attack.
17) Buffer overflow (CVE-ID: CVE-2024-31951)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in ospf_te_parse_ext_link when parsing OSPF LSA packets. A remote attacker can send specially crafted packets to the daemon, trigger memory corruption and perform a denial of service (DoS) attack.
18) NULL pointer dereference (CVE-ID: CVE-2024-34088)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the get_edge() function in ospf_te.c. A remote attacker can send specially crafted packets to the daemon and perform a denial of service (DoS) attack.
19) Input validation error (CVE-ID: CVE-2024-44070)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the bgp_attr_encap() function in bgpd/bgp_attr.c. A remote attacker can send specially crafted BGP traffic to the daemon and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.