
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability (CVE-2022-26127) was identified in FRRouting through version 8.1.0. The vulnerability exists due to missing a check on the input packet length in the babel_packet_examin function located in babeld/message.c (Debian Security).
The vulnerability stems from a missing validation check between packetlen and bodylen parameters before accessing memory in the babel_packet_examin function. The code fails to verify the relationship between these parameters, which can lead to buffer overflow conditions when accessing memory at specific locations in the code. The issue can be triggered when processing malformed network packets (GitHub Issue).
The vulnerability could allow an attacker to cause buffer overflow conditions, potentially leading to remote code execution or system crashes. When exploited, the issue can result in denial of service conditions affecting the FRRouting service (Ubuntu Security).
The vulnerability has been patched in various distributions. Debian has released security updates (7.5.1-1.1+deb11u4 for bullseye), Ubuntu has provided fixes (7.2.1-1ubuntu0.2+esm2 for Ubuntu 20.04), and upstream FRRouting has addressed the issue. Users are advised to upgrade to the latest patched versions (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."