{"id":"CVE-2022-26126","details":"Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to the use of strdup with a non-zero-terminated binary string in isis_nb_notifications.c.","modified":"2026-04-10T04:46:08.078962Z","published":"2022-03-03T18:15:08.143Z","related":["SUSE-SU-2022:0901-1","openSUSE-SU-2022:0901-1","openSUSE-SU-2024:11880-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XUCZR6RYQVZ35BFUV7OLIUEHZW2433I2/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MIEQNIWUSBQTFR65HM2LLIB7PH27CZUZ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTYSAL4QCE4XWMMBKUB7LSLPAFLWUML4/"},{"type":"REPORT","url":"https://github.com/FRRouting/frr/issues/10505"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/frrouting/frr","events":[{"introduced":"0"},{"fixed":"a3232e63e642742cef4f2c3cb6fd15f6500004bb"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"8.2"}]}}],"versions":["7.1_pulled","8.1-dev","base_7.2","base_7.3","base_7.4","base_7.5","base_7.6","base_8.0","base_8.1","frr-3.0-branchpoint","frr-3.1-dev","frr-5.1-dev","frr-6.1-dev","frr-7.1-dev","frr-7.2-dev","frr-7.3-dev","frr-7.4-dev","frr-7.5-dev","frr-7.6-dev","frr-8.0-dev","frr-8.1-dev","frr-8.1-rc1","reindent-master-after","reindent-master-before"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-26126.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}