In FRRouting (FRR) through 9.1, an attacker using a malformed Prefix SID attribute in a BGP UPDATE packet can cause the bgpd daemon to crash.
The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.
Link | Tags |
---|---|
https://github.com/FRRouting/frr/pull/15628 | third party advisory issue tracking |
https://github.com/FRRouting/frr/pull/15628/commits/ba6a8f1a31e1a88df2de69ea46068e8bd9b97138 | patch |
https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html | mailing list |