{"id":"CVE-2023-38802","details":"FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).","modified":"2026-04-10T04:59:11.969895Z","published":"2023-08-29T16:15:09.113Z","related":["ALSA-2023:5194","ALSA-2023:5219","SUSE-SU-2023:3709-1","SUSE-SU-2023:3762-1","SUSE-SU-2023:3793-1","SUSE-SU-2023:3836-1","SUSE-SU-2023:3839-1","SUSE-SU-2024:4090-1","openSUSE-SU-2024:13191-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html"},{"type":"ADVISORY","url":"https://news.ycombinator.com/item?id=37305800"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5495"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JLG64IF3FU7V76K4TKCCXVNEE6P2VUDO/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LMJNX44SMJM25JZO7XWHDQCOB4SNJPIE/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXR6PIVY4SWO7HDT4EY733H4X32SCPM4/"},{"type":"EVIDENCE","url":"https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/frrouting/frr","events":[{"introduced":"df7ab485bde1a511f131f7ad6b70cb43c48c8e6d"},{"last_affected":"16c38045b1a84f899da473398779cc593d82d2bd"},{"introduced":"0"},{"last_affected":"d5bec7b08149e9811013ba771ae6d557b396b380"}],"database_specific":{"versions":[{"introduced":"7.5.1"},{"last_affected":"9.0"},{"introduced":"0"},{"last_affected":"10.0"}]}}],"versions":["7.1_pulled","8.1-dev","base_10.0","base_7.2","base_7.3","base_7.4","base_7.5","base_7.6","base_8.0","base_8.1","base_8.2","base_8.3","base_8.4","base_8.5","base_9.0","base_9.1","frr-10.0-dev","frr-3.0-branchpoint","frr-3.1-dev","frr-5.1-dev","frr-6.1-dev","frr-7.1-dev","frr-7.2-dev","frr-7.3-dev","frr-7.4-dev","frr-7.5-dev","frr-7.6-dev","frr-8.0-dev","frr-8.1-dev","frr-8.1-rc1","frr-8.2-dev","frr-8.3-dev","frr-8.4-dev","frr-8.4-rc","frr-8.5-dev","frr-9.0-dev","frr-9.1-dev","frr-9.2-dev","reindent-master-after","reindent-master-before"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.3.3.2"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-38802.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}