Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2022-37032 and CVE-2022-36440 #13202

Closed
ajakk opened this issue Apr 4, 2023 · 4 comments
Closed

CVE-2022-37032 and CVE-2022-36440 #13202

ajakk opened this issue Apr 4, 2023 · 4 comments
Labels
triage Needs further investigation

Comments

@ajakk
Copy link

ajakk commented Apr 4, 2023

Github user @spwpun has published two vulnerabilities in frr. Reproducers are included in their disclosures:

https://github.com/spwpun/CVE-2022-37032/blob/main/poc.py
https://github.com/spwpun/pocs/blob/main/frr-bgpd.md

Is there any fix available?

@ajakk ajakk added the triage Needs further investigation label Apr 4, 2023
@ajakk ajakk changed the title CVE-2022-37032 and CVE-36440 CVE-2022-37032 and CVE-2022-36440 Apr 4, 2023
@ton31337
Copy link
Member

ton31337 commented Apr 4, 2023

This is fixed in 8.4 and above.

@ton31337 ton31337 closed this as completed Apr 4, 2023
@ajakk
Copy link
Author

ajakk commented Apr 5, 2023

Where are the patch(es)?

@ton31337
Copy link
Member

ton31337 commented Apr 5, 2023

@carnil
Copy link

carnil commented Apr 10, 2023

So

correct?

KanjiMonster added a commit to bisdn/meta-openembedded that referenced this issue May 11, 2023
Add a security fix from the stable/8.2 branch for two CVEs for the same
vulneratiblity:

CVE-2022-36440:
A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the
peek_for_as4_capability function. Attackers can maliciously construct
BGP open packets and send them to BGP peers running frr-bgpd, resulting
in DoS.

CVE-2022-40302:
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By
crafting a BGP OPEN message with an option of type 0xff (Extended Length
from RFC 9072), attackers may cause a denial of service (assertion
failure and daemon restart, or out-of-bounds read). This is possible
because of inconsistent boundary checks that do not account for reading
3 bytes (instead of 2) in this 0xff case.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-36440
https://nvd.nist.gov/vuln/detail/CVE-2022-40302
https://cyberriskleaders.com/new-vulnerabilities-disclosed-in-frrouting-software/
FRRouting/frr#13202

Patch from:
FRRouting/frr@02a0e45

Signed-off-by: Jonas Gorski <[email protected]>
halstead pushed a commit to openembedded/meta-openembedded that referenced this issue Jun 7, 2023
Add a security fix from the stable/8.2 branch for two CVEs for the same
vulneratiblity:

CVE-2022-36440:
A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the
peek_for_as4_capability function. Attackers can maliciously construct
BGP open packets and send them to BGP peers running frr-bgpd, resulting
in DoS.

CVE-2022-40302:
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By
crafting a BGP OPEN message with an option of type 0xff (Extended Length
from RFC 9072), attackers may cause a denial of service (assertion
failure and daemon restart, or out-of-bounds read). This is possible
because of inconsistent boundary checks that do not account for reading
3 bytes (instead of 2) in this 0xff case.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-36440
https://nvd.nist.gov/vuln/detail/CVE-2022-40302
https://cyberriskleaders.com/new-vulnerabilities-disclosed-in-frrouting-software/
FRRouting/frr#13202

Patch from:
FRRouting/frr@02a0e45

Signed-off-by: Jonas Gorski <[email protected]>
Signed-off-by: Armin Kuster <[email protected]>
jpuhlman pushed a commit to MontaVista-OpenSourceTechnology/meta-openembedded that referenced this issue Jun 15, 2023
Source: meta-openembedded
MR: 126092
Type: Integration
Disposition: Merged from meta-openembedded
ChangeID: 49c8c1e
Description:

Add a security fix from the stable/8.2 branch for two CVEs for the same
vulneratiblity:

CVE-2022-36440:
A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the
peek_for_as4_capability function. Attackers can maliciously construct
BGP open packets and send them to BGP peers running frr-bgpd, resulting
in DoS.

CVE-2022-40302:
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By
crafting a BGP OPEN message with an option of type 0xff (Extended Length
from RFC 9072), attackers may cause a denial of service (assertion
failure and daemon restart, or out-of-bounds read). This is possible
because of inconsistent boundary checks that do not account for reading
3 bytes (instead of 2) in this 0xff case.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-36440
https://nvd.nist.gov/vuln/detail/CVE-2022-40302
https://cyberriskleaders.com/new-vulnerabilities-disclosed-in-frrouting-software/
FRRouting/frr#13202

Patch from:
FRRouting/frr@02a0e45

Signed-off-by: Jonas Gorski <[email protected]>
Signed-off-by: Armin Kuster <[email protected]>
Signed-off-by: Jeremy A. Puhlman <[email protected]>
xhuff pushed a commit to xhuff/meta-openembedded that referenced this issue Jun 16, 2023
Add a security fix from the stable/8.2 branch for two CVEs for the same
vulneratiblity:

CVE-2022-36440:
A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the
peek_for_as4_capability function. Attackers can maliciously construct
BGP open packets and send them to BGP peers running frr-bgpd, resulting
in DoS.

CVE-2022-40302:
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By
crafting a BGP OPEN message with an option of type 0xff (Extended Length
from RFC 9072), attackers may cause a denial of service (assertion
failure and daemon restart, or out-of-bounds read). This is possible
because of inconsistent boundary checks that do not account for reading
3 bytes (instead of 2) in this 0xff case.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-36440
https://nvd.nist.gov/vuln/detail/CVE-2022-40302
https://cyberriskleaders.com/new-vulnerabilities-disclosed-in-frrouting-software/
FRRouting/frr#13202

Patch from:
FRRouting/frr@02a0e45

Signed-off-by: Jonas Gorski <[email protected]>
Signed-off-by: Armin Kuster <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
triage Needs further investigation
Projects
None yet
Development

No branches or pull requests

3 participants