{"id":"CVE-2022-40318","details":"An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in bgp_open_option_parse in the bgp_open.c file, a different location (with a different attack vector) relative to CVE-2022-40302.","modified":"2026-04-10T04:50:43.443895Z","published":"2023-05-03T12:16:27.800Z","related":["ALSA-2023:6434"],"references":[{"type":"ADVISORY","url":"https://github.com/FRRouting/frr/releases"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5495"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/frrouting/frr","events":[{"introduced":"0"},{"last_affected":"087350d968e92f1f4f24ae0aae6de2722088fe79"},{"introduced":"0"},{"last_affected":"d5bec7b08149e9811013ba771ae6d557b396b380"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.4"},{"introduced":"0"},{"last_affected":"10.0"}]}}],"versions":["7.1_pulled","8.1-dev","base_10.0","base_7.2","base_7.3","base_7.4","base_7.5","base_7.6","base_8.0","base_8.1","base_8.2","base_8.3","base_8.4","base_8.5","base_9.0","base_9.1","frr-10.0-dev","frr-3.0-branchpoint","frr-3.1-dev","frr-5.1-dev","frr-6.1-dev","frr-7.1-dev","frr-7.2-dev","frr-7.3-dev","frr-7.4-dev","frr-7.5-dev","frr-7.6-dev","frr-8.0-dev","frr-8.1-dev","frr-8.1-rc1","frr-8.2-dev","frr-8.3-dev","frr-8.4-dev","frr-8.4-rc","frr-8.5-dev","frr-9.0-dev","frr-9.1-dev","frr-9.2-dev","reindent-master-after","reindent-master-before"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-40318.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}