A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input packet length in the babel_packet_examin function in babeld/message.c.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/FRRouting/frr/issues/10502 | Exploit Issue Tracking Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html | |
| https://github.com/FRRouting/frr/issues/10502 | Exploit Issue Tracking Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html | 
Configurations
                    History
                    21 Nov 2024, 06:53
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/FRRouting/frr/issues/10502 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html - | 
28 Apr 2024, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
27 Jun 2023, 20:38
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-1284 | 
Information
                Published : 2022-03-03 18:15
Updated : 2024-11-21 06:53
NVD link : CVE-2022-26128
Mitre link : CVE-2022-26128
CVE.ORG link : CVE-2022-26128
JSON object : View
Products Affected
                frrouting
- frrouting
 
