Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:2981 - Security Advisory
Issued:
2024-05-22
Updated:
2024-05-22

RHSA-2024:2981 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: frr security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for frr is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM, NHRP, PBR, EIGRP and BFD.

Security Fix(es):

  • frr: missing length check in bgp_attr_psid_sub() can lead do DoS (CVE-2023-31490)
  • frr: processes invalid NLRIs if attribute length is zero (CVE-2023-41358)
  • frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c (CVE-2023-41909)
  • frr: mishandled malformed data leading to a crash (CVE-2023-46752)
  • frr: crafted BGP UPDATE message leading to a crash (CVE-2023-46753)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2235839 - CVE-2023-41358 frr: processes invalid NLRIs if attribute length is zero
  • BZ - 2237416 - CVE-2023-41909 frr: NULL pointer dereference in bgp_nlri_parse_flowspec() in bgpd/bgp_flowspec.c
  • BZ - 2238992 - CVE-2023-31490 frr: missing length check in bgp_attr_psid_sub() can lead do DoS
  • BZ - 2246379 - CVE-2023-46752 frr: mishandled malformed data leading to a crash
  • BZ - 2246381 - CVE-2023-46753 frr: crafted BGP UPDATE message leading to a crash
  • RHEL-12039 - crash in plist update (trie_install_fn)
  • RHEL-2263 - eBGP multihop peer flapping due to delta miscalculation of new configuration
  • RHEL-6583 - Routes are not refreshed after changing the inbound route rules from deny to permit
  • RHEL-22303 - Zebra not fetching host routes

CVEs

  • CVE-2023-31490
  • CVE-2023-41358
  • CVE-2023-41909
  • CVE-2023-46752
  • CVE-2023-46753

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
frr-7.5.1-22.el8.src.rpm SHA-256: 9c6d20e602c7080310bd22412d00db209c2b735e93951ef0def245c3f89b4580
x86_64
frr-7.5.1-22.el8.x86_64.rpm SHA-256: 9040922701a9448d7db2af4555c2271b9109dc887722d7d952bc14f82a0f99d4
frr-debuginfo-7.5.1-22.el8.x86_64.rpm SHA-256: 0f64862f8719ef40706d10cf5af91e9c199545fd548e94cc1e30697aa438996a
frr-debugsource-7.5.1-22.el8.x86_64.rpm SHA-256: 24790f58a90c43e544c817e9bfca5c2ab72f6a4c50c76a472ca4bb8a5191d970
frr-selinux-7.5.1-22.el8.noarch.rpm SHA-256: a52554a0884ac67d0c6dcef853ca89ed7e825701674c824a1d31c24332112e56

Red Hat Enterprise Linux for IBM z Systems 8

SRPM
frr-7.5.1-22.el8.src.rpm SHA-256: 9c6d20e602c7080310bd22412d00db209c2b735e93951ef0def245c3f89b4580
s390x
frr-7.5.1-22.el8.s390x.rpm SHA-256: e0497b61954cda2615846b7ec65d160885a66fdde99df140baadb48d4c77cf79
frr-debuginfo-7.5.1-22.el8.s390x.rpm SHA-256: 7ecc9b698601be189996c0e57399d71ef49f2c377088ad984a5f458b618d2fd5
frr-debugsource-7.5.1-22.el8.s390x.rpm SHA-256: ac85923c0495202f88bd7411d8024fe16ec4dd62b30f536c2b6a5c33dd700d2a
frr-selinux-7.5.1-22.el8.noarch.rpm SHA-256: a52554a0884ac67d0c6dcef853ca89ed7e825701674c824a1d31c24332112e56

Red Hat Enterprise Linux for Power, little endian 8

SRPM
frr-7.5.1-22.el8.src.rpm SHA-256: 9c6d20e602c7080310bd22412d00db209c2b735e93951ef0def245c3f89b4580
ppc64le
frr-7.5.1-22.el8.ppc64le.rpm SHA-256: ff3571a83e0950b22a9141b9a93ab61c796484d8afef9b46b76a9e4f0000c939
frr-debuginfo-7.5.1-22.el8.ppc64le.rpm SHA-256: aa9395aca73f60009f967b858e97e7b772353a28b87cb2d10dabe1391f399f17
frr-debugsource-7.5.1-22.el8.ppc64le.rpm SHA-256: f5c08197f8a93a05128b6ece5ed5f8cab9be6748d2672e5ca7490b1dde933c6a
frr-selinux-7.5.1-22.el8.noarch.rpm SHA-256: a52554a0884ac67d0c6dcef853ca89ed7e825701674c824a1d31c24332112e56

Red Hat Enterprise Linux for ARM 64 8

SRPM
frr-7.5.1-22.el8.src.rpm SHA-256: 9c6d20e602c7080310bd22412d00db209c2b735e93951ef0def245c3f89b4580
aarch64
frr-7.5.1-22.el8.aarch64.rpm SHA-256: 7d22b484f22dcc6ee5cc864dd165b23d8b03c567c2a5bfd56987600180ec3674
frr-debuginfo-7.5.1-22.el8.aarch64.rpm SHA-256: bf287e7961b64ab8d2d5a9741ae49f59930ba4fffdbfc61a412d10d434d34647
frr-debugsource-7.5.1-22.el8.aarch64.rpm SHA-256: c749a51787f9b4b8c27c6ebc074d5581a3bd5882d3b0831f67f9c65e4372b05b
frr-selinux-7.5.1-22.el8.noarch.rpm SHA-256: a52554a0884ac67d0c6dcef853ca89ed7e825701674c824a1d31c24332112e56

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility