{"affected":[{"ecosystem_specific":{"binaries":[{"frr":"8.4-150500.4.8.1","frr-devel":"8.4-150500.4.8.1","libfrr0":"8.4-150500.4.8.1","libfrr_pb0":"8.4-150500.4.8.1","libfrrcares0":"8.4-150500.4.8.1","libfrrfpm_pb0":"8.4-150500.4.8.1","libfrrospfapiclient0":"8.4-150500.4.8.1","libfrrsnmp0":"8.4-150500.4.8.1","libfrrzmq0":"8.4-150500.4.8.1","libmlag_pb0":"8.4-150500.4.8.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP5","name":"frr","purl":"pkg:rpm/suse/frr&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.4-150500.4.8.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"frr":"8.4-150500.4.8.1","frr-devel":"8.4-150500.4.8.1","libfrr0":"8.4-150500.4.8.1","libfrr_pb0":"8.4-150500.4.8.1","libfrrcares0":"8.4-150500.4.8.1","libfrrfpm_pb0":"8.4-150500.4.8.1","libfrrospfapiclient0":"8.4-150500.4.8.1","libfrrsnmp0":"8.4-150500.4.8.1","libfrrzmq0":"8.4-150500.4.8.1","libmlag_pb0":"8.4-150500.4.8.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"frr","purl":"pkg:rpm/opensuse/frr&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.4-150500.4.8.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for frr fixes the following issues:\n\n- CVE-2023-38802: Fixed bad length handling in BGP attribute handling (bsc#1213284). \n- CVE-2023-41358: Fixed crash in bgpd/bgp_packet.c (bsc#1214735).\n- CVE-2023-41360: Fixed out-of-bounds read in bgpd/bgp_packet.c (bsc#1214739).\n- CVE-2023-3748: Fixed inifinite loop in babld message parsing may cause DoS (bsc#1213434).\n- CVE-2023-41909: Fixed NULL pointer dereference due to processing in bgp_nlri_parse_flowspec (bsc#1215065).\n","id":"SUSE-SU-2023:3709-1","modified":"2023-09-20T16:04:43Z","published":"2023-09-20T16:04:43Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233709-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213284"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214735"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215065"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-41358"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-41360"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-41909"}],"related":["CVE-2023-3748","CVE-2023-38802","CVE-2023-41358","CVE-2023-41360","CVE-2023-41909"],"summary":"Security update for frr","upstream":["CVE-2023-3748","CVE-2023-38802","CVE-2023-41358","CVE-2023-41360","CVE-2023-41909"]}