{"id":"CVE-2022-36440","details":"A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the peek_for_as4_capability function. Attackers can maliciously construct BGP open packets and send them to BGP peers running frr-bgpd, resulting in DoS.","modified":"2026-04-02T08:07:43.631757Z","published":"2023-04-03T16:15:07.287Z","related":["ALSA-2023:6434"],"references":[{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HU4PKLUVB5CTMOVQ2GV33TNUNMJCBGD/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBXEXL2ZQBWCBLNUP6P67FHECXQWSK3L/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GM66PNHGCXZU66LQCTP2FSJLFF6CVMSI/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5495"},{"type":"ADVISORY","url":"https://github.com/spwpun/pocs"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html"},{"type":"EVIDENCE","url":"https://github.com/spwpun/pocs/blob/main/frr-bgpd.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/frrouting/frr","events":[{"introduced":"0"},{"last_affected":"23ad8186e5bec98d849c56a35f956d390d608e7f"},{"introduced":"0"},{"last_affected":"d5bec7b08149e9811013ba771ae6d557b396b380"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.3-NA"},{"introduced":"0"},{"last_affected":"10.0"}]}}],"versions":["7.1_pulled","8.0-dev","8.1-dev","FRR-3.0.1","base_7.2","base_7.3","base_7.4","base_7.5","base_7.6","base_8.0","base_8.1","base_8.2","debian/frr-6.0.2-1","debian/frr-6.0.2-2","debian/frr-6.0.3-1","docker/7.5.0","docker/7.5.1","docker/8.1.0","docker/8.2.0","docker/8.2.1","docker/8.2.2","frr-2.0","frr-2.0-rc1","frr-2.0-rc2","frr-2.0.1","frr-2.0.2","frr-3.0","frr-3.0-branchpoint","frr-3.0-rc0","frr-3.0-rc1","frr-3.0-rc2","frr-3.0-rc3","frr-3.0.2","frr-3.0.3","frr-3.0.4","frr-3.1-dev","frr-4.0","frr-4.0-dev","frr-4.0.1","frr-5.0","frr-5.0-dev","frr-5.0.1","frr-5.0.2","frr-5.1-dev","frr-6.0","frr-6.0.1","frr-6.0.2","frr-6.0.3","frr-6.1-dev","frr-7.0","frr-7.0.1","frr-7.1","frr-7.1-dev","frr-7.2","frr-7.2-dev","frr-7.2.1","frr-7.3","frr-7.3-dev","frr-7.3.1","frr-7.4","frr-7.4-dev","frr-7.5","frr-7.5-dev","frr-7.5.1","frr-7.6-dev","frr-8.0","frr-8.0-dev","frr-8.0.1","frr-8.1","frr-8.1-dev","frr-8.1-rc1","frr-8.1-rc2","frr-8.2","frr-8.2-dev","frr-8.2-rc","frr-8.2.1","frr-8.2.1.rc","frr-8.2.2","frr-8.2.2.rc","frr-8.3-dev","reindent-3.0-after","reindent-3.0-before","reindent-master-after","reindent-master-before"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36440.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}