Unrated severityNVD Advisory· Published Mar 3, 2022· Updated Nov 4, 2025
CVE-2022-26128
CVE-2022-26128
Description
A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input packet length in the babel_packet_examin function in babeld/message.c.
Affected products
4- osv-coords3 versionspkg:rpm/opensuse/frr&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/frr&distro=openSUSE%20Tumbleweedpkg:rpm/suse/frr&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3
< 7.4-150300.4.3.1+ 2 more
- (no CPE)range: < 7.4-150300.4.3.1
- (no CPE)range: < 8.1-3.1
- (no CPE)range: < 7.4-150300.4.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/FRRouting/frr/issues/10502mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2024/04/msg00019.htmlmitre
News mentions
0No linked articles in our index yet.