{"id":"CVE-2024-44070","details":"An issue was discovered in FRRouting (FRR) through 10.1. bgp_attr_encap in bgpd/bgp_attr.c does not check the actual remaining stream length before taking the TLV value.","modified":"2026-05-18T05:58:57.144389735Z","published":"2024-08-19T00:00:00Z","related":["SUSE-SU-2024:3090-1","SUSE-SU-2024:3108-1","SUSE-SU-2024:3426-1","SUSE-SU-2024:3433-1","SUSE-SU-2024:3478-1","SUSE-SU-2024:4090-1","openSUSE-SU-2024:14286-1"],"database_specific":{"cna_assigner":"mitre","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/44xxx/CVE-2024-44070.json"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00007.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/44xxx/CVE-2024-44070.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44070"},{"type":"FIX","url":"https://github.com/FRRouting/frr/pull/16497"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/frrouting/frr","events":[{"introduced":"0"},{"fixed":"14c29f83a0dfbc4023cdfff34ed38cf43dca409c"}]}],"versions":["base_10.1","frr-10.0-dev","base_10.0","frr-9.2-dev","base_9.1","base_9.0","frr-9.1-dev","base_8.5","frr-9.0-dev","frr-8.4-rc","base_8.4","frr-8.5-dev","base_8.3","frr-8.4-dev","base_8.2","frr-8.3-dev","frr-8.1-rc1","base_8.1","frr-8.2-dev","8.1-dev","frr-8.1-dev","base_8.0","base_7.6","frr-8.0-dev","frr-7.6-dev","base_7.5","base_7.4","frr-7.5-dev","base_7.3","frr-7.4-dev","base_7.2","frr-7.3-dev","frr-7.2-dev","7.1_pulled","frr-7.1-dev","frr-6.1-dev","frr-5.1-dev","reindent-master-after","reindent-master-before","frr-3.1-dev","frr-3.0-branchpoint"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-44070.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}