{"affected":[{"ecosystem_specific":{"binaries":[{"frr":"8.4-150500.4.23.1","frr-devel":"8.4-150500.4.23.1","libfrr0":"8.4-150500.4.23.1","libfrr_pb0":"8.4-150500.4.23.1","libfrrcares0":"8.4-150500.4.23.1","libfrrfpm_pb0":"8.4-150500.4.23.1","libfrrospfapiclient0":"8.4-150500.4.23.1","libfrrsnmp0":"8.4-150500.4.23.1","libfrrzmq0":"8.4-150500.4.23.1","libmlag_pb0":"8.4-150500.4.23.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP5","name":"frr","purl":"pkg:rpm/suse/frr&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.4-150500.4.23.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"frr":"8.4-150500.4.23.1","frr-devel":"8.4-150500.4.23.1","libfrr0":"8.4-150500.4.23.1","libfrr_pb0":"8.4-150500.4.23.1","libfrrcares0":"8.4-150500.4.23.1","libfrrfpm_pb0":"8.4-150500.4.23.1","libfrrospfapiclient0":"8.4-150500.4.23.1","libfrrsnmp0":"8.4-150500.4.23.1","libfrrzmq0":"8.4-150500.4.23.1","libmlag_pb0":"8.4-150500.4.23.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP6","name":"frr","purl":"pkg:rpm/suse/frr&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.4-150500.4.23.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"frr":"8.4-150500.4.23.1","frr-devel":"8.4-150500.4.23.1","libfrr0":"8.4-150500.4.23.1","libfrr_pb0":"8.4-150500.4.23.1","libfrrcares0":"8.4-150500.4.23.1","libfrrfpm_pb0":"8.4-150500.4.23.1","libfrrospfapiclient0":"8.4-150500.4.23.1","libfrrsnmp0":"8.4-150500.4.23.1","libfrrzmq0":"8.4-150500.4.23.1","libmlag_pb0":"8.4-150500.4.23.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"frr","purl":"pkg:rpm/opensuse/frr&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.4-150500.4.23.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"frr":"8.4-150500.4.23.1","frr-devel":"8.4-150500.4.23.1","libfrr0":"8.4-150500.4.23.1","libfrr_pb0":"8.4-150500.4.23.1","libfrrcares0":"8.4-150500.4.23.1","libfrrfpm_pb0":"8.4-150500.4.23.1","libfrrospfapiclient0":"8.4-150500.4.23.1","libfrrsnmp0":"8.4-150500.4.23.1","libfrrzmq0":"8.4-150500.4.23.1","libmlag_pb0":"8.4-150500.4.23.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"frr","purl":"pkg:rpm/opensuse/frr&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.4-150500.4.23.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for frr fixes the following issues:\n\n- CVE-2024-34088: Fixed null pointer via get_edge() function can trigger a denial of service (bsc#1223786).\n- CVE-2024-31951: Fixed buffer overflow in ospf_te_parse_ext_link (bsc#1222528).\n- CVE-2024-31950: Fixed buffer overflow and daemon crash in ospf_te_parse_ri (bsc#1222526).\n","id":"SUSE-SU-2024:1971-1","modified":"2024-06-10T18:05:22Z","published":"2024-06-10T18:05:22Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20241971-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222526"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222528"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-31950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-31951"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-34088"}],"related":["CVE-2024-31950","CVE-2024-31951","CVE-2024-34088"],"summary":"Security update for frr","upstream":["CVE-2024-31950","CVE-2024-31951","CVE-2024-34088"]}