NIXPKGS-2026-1350
GitHub issue
published on
Permalink
CVE-2026-28532
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): ADJACENT_NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse ignored
- @LeSuisse ignored package prometheus-frr-exporter
- @LeSuisse accepted
- @LeSuisse published on GitHub
FRRouting < 10.5.3 Integer Overflow in OSPF TLV Parser Functions
FRRouting before 10.5.3 contains an integer overflow vulnerability in seven OSPF Traffic Engineering and Segment Routing TLV parser functions where a uint16_t accumulator variable truncates uint32_t values returned by the TLV_SIZE() macro, causing the loop termination condition to fail while pointer advancement continues unchecked. Attackers with an established OSPF adjacency can send a crafted LS Update packet with a malicious Type 10 or Type 11 Opaque LSA to trigger out-of-bounds memory reads and crash all affected routers in the OSPF area or autonomous system.
References
-
https://github.com/FRRouting/frr/pull/21002 issue-tracking
Ignored references (2)
-
https://www.vulncheck.com/advisories/frrouting-integer-overflow-in-ospf-tlv-par… third-party-advisory
-
https://github.com/FRRouting/frr/releases/tag/frr-10.5.3 release-notes
Affected products
frr
- =<10.5.3
Matching in nixpkgs
Package maintainers
-
@thillux Markus Theil <theil.markus@gmail.com>
-
@woffs Frank Doepper <github@woffs.de>