{"id":"CVE-2022-26128","details":"A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input packet length in the babel_packet_examin function in babeld/message.c.","modified":"2026-03-15T22:46:14.491220Z","published":"2022-03-03T18:15:08.243Z","related":["SUSE-SU-2022:0901-1","openSUSE-SU-2022:0901-1","openSUSE-SU-2024:11880-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00019.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00007.html"},{"type":"REPORT","url":"https://github.com/FRRouting/frr/issues/10502"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/frrouting/frr","events":[{"introduced":"0"},{"last_affected":"11d557869cc790c36dd421da61bf9a194fa7e219"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.1"}]}}],"versions":["7.1_pulled","base_7.2","base_7.3","base_7.4","base_7.5","base_7.6","base_8.0","frr-2.0","frr-2.0-rc1","frr-2.0-rc2","frr-3.0-branchpoint","frr-3.0-rc0","frr-3.0-rc1","frr-3.1-dev","frr-5.1-dev","frr-6.1-dev","frr-7.1-dev","frr-7.2-dev","frr-7.3-dev","frr-7.4-dev","frr-7.5-dev","frr-7.6-dev","frr-8.0-dev","frr-8.1-dev","reindent-3.0-after","reindent-3.0-before","reindent-master-after","reindent-master-before"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-26128.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}