USN-6436-1: FRR vulnerabilities
18 October 2023
Several security issues were fixed in FRR.
Releases
Packages
- frr - FRRouting suite of internet protocols
Details
It was discovered that the FRR did not properly check the attribute length
in NRLI. A remote attacker could possibly use this issue to cause a denial
of service. (CVE-2023-41358)
It was discovered that the FRR did not properly manage memory when reading
initial bytes of ORF header. A remote attacker could possibly use this
issue to cause a denial of service. (CVE-2023-41360)
It was discovered that FRR did not properly validate the attributes in the
BGP FlowSpec functionality. A remote attacker could possibly use this issue
to cause a denial of service. (CVE-2023-41909)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04
Ubuntu 22.04
Ubuntu 20.04
-
frr
-
7.2.1-1ubuntu0.2+esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6432-1: quagga-ripd, quagga-bgpd, quagga-core, quagga-ospf6d, quagga-isisd, quagga-pimd, quagga, quagga-ripngd, quagga-doc, quagga-ospfd