{"affected":[{"ecosystem_specific":{"binaries":[{"frr":"8.5.6-150500.4.30.1","frr-devel":"8.5.6-150500.4.30.1","libfrr0":"8.5.6-150500.4.30.1","libfrr_pb0":"8.5.6-150500.4.30.1","libfrrcares0":"8.5.6-150500.4.30.1","libfrrfpm_pb0":"8.5.6-150500.4.30.1","libfrrospfapiclient0":"8.5.6-150500.4.30.1","libfrrsnmp0":"8.5.6-150500.4.30.1","libfrrzmq0":"8.5.6-150500.4.30.1","libmlag_pb0":"8.5.6-150500.4.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP5","name":"frr","purl":"pkg:rpm/suse/frr&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.5.6-150500.4.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"frr":"8.5.6-150500.4.30.1","frr-devel":"8.5.6-150500.4.30.1","libfrr0":"8.5.6-150500.4.30.1","libfrr_pb0":"8.5.6-150500.4.30.1","libfrrcares0":"8.5.6-150500.4.30.1","libfrrfpm_pb0":"8.5.6-150500.4.30.1","libfrrospfapiclient0":"8.5.6-150500.4.30.1","libfrrsnmp0":"8.5.6-150500.4.30.1","libfrrzmq0":"8.5.6-150500.4.30.1","libmlag_pb0":"8.5.6-150500.4.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP6","name":"frr","purl":"pkg:rpm/suse/frr&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.5.6-150500.4.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"frr":"8.5.6-150500.4.30.1","frr-devel":"8.5.6-150500.4.30.1","libfrr0":"8.5.6-150500.4.30.1","libfrr_pb0":"8.5.6-150500.4.30.1","libfrrcares0":"8.5.6-150500.4.30.1","libfrrfpm_pb0":"8.5.6-150500.4.30.1","libfrrospfapiclient0":"8.5.6-150500.4.30.1","libfrrsnmp0":"8.5.6-150500.4.30.1","libfrrzmq0":"8.5.6-150500.4.30.1","libmlag_pb0":"8.5.6-150500.4.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"frr","purl":"pkg:rpm/opensuse/frr&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.5.6-150500.4.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"frr":"8.5.6-150500.4.30.1","frr-devel":"8.5.6-150500.4.30.1","libfrr0":"8.5.6-150500.4.30.1","libfrr_pb0":"8.5.6-150500.4.30.1","libfrrcares0":"8.5.6-150500.4.30.1","libfrrfpm_pb0":"8.5.6-150500.4.30.1","libfrrospfapiclient0":"8.5.6-150500.4.30.1","libfrrsnmp0":"8.5.6-150500.4.30.1","libfrrzmq0":"8.5.6-150500.4.30.1","libmlag_pb0":"8.5.6-150500.4.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"frr","purl":"pkg:rpm/opensuse/frr&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.5.6-150500.4.30.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for frr fixes the following issues:\n\nUpdate to frr 8.5.6 (jsc#PED-PED-11092) including fixes for:\n\n- CVE-2024-44070,CVE-2024-34088,CVE-2024-31951,CVE-2024-31950,\n  CVE-2024-31948,CVE-2024-27913,CVE-2023-47235,CVE-2023-47234,\n  CVE-2023-46753,CVE-2023-46752,CVE-2023-41909,CVE-2023-41360,\n  CVE-2023-41358,CVE-2023-38802,CVE-2023-38407,CVE-2023-38406,\n  CVE-2023-3748,CVE-2023-31490,CVE-2023-31489 and other bugfixes.\n  See https://frrouting.org/release/8.5.6/ for details.\n\nThe most recent frr 8.x series provides several new features,\nimprovements and bug fixes for various protocols and daemons,\nespecially for PIM/PIMv6/BGP and VRF support.\n\nSee https://frrouting.org/release/8.5/ for details and links.\n","id":"SUSE-SU-2024:4090-1","modified":"2024-11-28T07:57:59Z","published":"2024-11-28T07:57:59Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20244090-1/"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-31489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-31490"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-3748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38406"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38407"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38802"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-41358"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-41360"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-41909"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-46752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-46753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-47234"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-47235"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27913"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-31948"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-31950"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-31951"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-34088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-44070"}],"related":["CVE-2023-31489","CVE-2023-31490","CVE-2023-3748","CVE-2023-38406","CVE-2023-38407","CVE-2023-38802","CVE-2023-41358","CVE-2023-41360","CVE-2023-41909","CVE-2023-46752","CVE-2023-46753","CVE-2023-47234","CVE-2023-47235","CVE-2024-27913","CVE-2024-31948","CVE-2024-31950","CVE-2024-31951","CVE-2024-34088","CVE-2024-44070"],"summary":"Security update for frr","upstream":["CVE-2023-31489","CVE-2023-31490","CVE-2023-3748","CVE-2023-38406","CVE-2023-38407","CVE-2023-38802","CVE-2023-41358","CVE-2023-41360","CVE-2023-41909","CVE-2023-46752","CVE-2023-46753","CVE-2023-47234","CVE-2023-47235","CVE-2024-27913","CVE-2024-31948","CVE-2024-31950","CVE-2024-31951","CVE-2024-34088","CVE-2024-44070"]}