CVE-2024-55553
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2024-55553 affects FRRouting (FRR) versions before 10.3, from version 6.0 onward. The vulnerability involves route re-validation when the total size of an update received via RTR exceeds the internal socket's buffer size (default 4K on most operating systems). The issue was discovered in early 2025 and fixed versions include 10.0.3, 10.1.2, 10.2.1, and versions 10.3 and above (NVD).

Technical details

The vulnerability occurs when all routes are re-validated if the total size of an update received via RTR exceeds the internal socket's buffer size. This can be triggered when more than the default buffer size (4K) of updates occur during an update interval, which typically happens every 30 minutes. The issue has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H and is classified under CWE-404 (Improper Resource Shutdown or Release) (NVD).

Impact

The vulnerability can lead to significant performance degradation in FRR instances using RPKI globally. For routers with large full tables, the re-validation process may take more than 30 minutes to complete. Additionally, the continuous re-validation triggers heightened BMP traffic to ingestors, potentially affecting network performance (Debian LTS).

Mitigation and workarounds

The vulnerability has been fixed in FRR versions 10.0.3, 10.1.2, 10.2.1, and versions 10.3 and above. Various Linux distributions have also released security updates, including Debian 11 (Bullseye) which fixed the issue in version 7.5.1-1.1+deb11u4 (Debian LTS).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management