{
  "document": {
    "aggregate_severity": {
      "text": "Medium"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/vex/2022/cve-2022-40318-els_os-almalinux9_2esu.json"
      }
    ],
    "title": "Security update on CVE-2022-40318",
    "tracking": {
      "current_release_date": "2026-01-19T22:22:20Z",
      "generator": {
        "date": "2026-01-19T22:22:20Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2022-40318-ELS_OS-ALMALINUX9.2ESU",
      "initial_release_date": "2022-01-01T00:00:00Z",
      "revision_history": [
        {
          "date": "2022-01-01T00:00:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-11-29T10:41:07Z",
          "number": "2",
          "summary": "Official Publication"
        },
        {
          "date": "2025-12-23T19:08:30Z",
          "number": "3",
          "summary": "Update document"
        },
        {
          "date": "2026-01-19T22:22:20Z",
          "number": "4",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.2",
                "product": {
                  "name": "AlmaLinux 9.2",
                  "product_id": "AlmaLinux-9.2",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.2:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "frr-0:8.3.1-5.el9.2.alma.x86_64",
                "product": {
                  "name": "frr-0:8.3.1-5.el9.2.alma.x86_64",
                  "product_id": "frr-0:8.3.1-5.el9.2.alma.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/almalinux/frr@8.3.1-5.el9.2.alma?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "frr-selinux-0:8.3.1-5.el9.2.alma.noarch",
                "product": {
                  "name": "frr-selinux-0:8.3.1-5.el9.2.alma.noarch",
                  "product_id": "frr-selinux-0:8.3.1-5.el9.2.alma.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/almalinux/frr-selinux@8.3.1-5.el9.2.alma?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els1.x86_64",
                "product": {
                  "name": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els1.x86_64",
                  "product_id": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/frr@8.3.1-5.el9.2.alma.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els3.x86_64",
                "product": {
                  "name": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els3.x86_64",
                  "product_id": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/frr@8.3.1-5.el9.2.alma.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els2.x86_64",
                "product": {
                  "name": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els2.x86_64",
                  "product_id": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/frr@8.3.1-5.el9.2.alma.tuxcare.els2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els1.noarch",
                "product": {
                  "name": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els1.noarch",
                  "product_id": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/frr-selinux@8.3.1-5.el9.2.alma.tuxcare.els1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els3.noarch",
                "product": {
                  "name": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els3.noarch",
                  "product_id": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/frr-selinux@8.3.1-5.el9.2.alma.tuxcare.els3?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els2.noarch",
                "product": {
                  "name": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els2.noarch",
                  "product_id": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/frr-selinux@8.3.1-5.el9.2.alma.tuxcare.els2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els1.x86_64"
        },
        "product_reference": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "frr-0:8.3.1-5.el9.2.alma.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.x86_64"
        },
        "product_reference": "frr-0:8.3.1-5.el9.2.alma.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els3.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els3.x86_64"
        },
        "product_reference": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els3.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els2.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els2.x86_64"
        },
        "product_reference": "frr-0:8.3.1-5.el9.2.alma.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els1.noarch as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els1.noarch"
        },
        "product_reference": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "frr-selinux-0:8.3.1-5.el9.2.alma.noarch as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.noarch"
        },
        "product_reference": "frr-selinux-0:8.3.1-5.el9.2.alma.noarch",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els3.noarch as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els3.noarch"
        },
        "product_reference": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els3.noarch",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els2.noarch as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els2.noarch"
        },
        "product_reference": "frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els2.noarch",
        "relates_to_product_reference": "AlmaLinux-9.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-40318",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in bgp_open_option_parse in the bgp_open.c file, a different location (with a different attack vector) relative to CVE-2022-40302.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "known_affected": [
          "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els2.x86_64",
          "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els3.x86_64",
          "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.x86_64",
          "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els1.noarch",
          "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els2.noarch",
          "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els3.noarch",
          "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-40318"
        },
        {
          "category": "external",
          "summary": "https://github.com/FRRouting/frr/releases",
          "url": "https://github.com/FRRouting/frr/releases"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5495",
          "url": "https://www.debian.org/security/2023/dsa-5495"
        }
      ],
      "release_date": "2023-05-03T12:16:00Z",
      "remediations": [
        {
          "category": "no_fix_planned",
          "details": "This vulnerability only affects systems that run FRRouting’s bgpd and are reachable on TCP/179 to receive BGP OPEN messages; hosts without FRR enabled or without BGP control-plane exposure are not impacted. Even when applicable, the flaw results in a bgpd crash/restart or out‑of‑bounds read during session negotiation, with no confidentiality or integrity effect. Because exploitation targets the BGP control plane rather than common application services, and the impact is limited to availability of the routing daemon, it can be safely deprioritized in centrally managed VM/server estates.",
          "product_ids": [
            "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els3.x86_64",
            "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.x86_64",
            "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els1.noarch",
            "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els2.noarch",
            "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els3.noarch",
            "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.tuxcare.els3.x86_64",
            "AlmaLinux-9.2:frr-0:8.3.1-5.el9.2.alma.x86_64",
            "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els1.noarch",
            "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els2.noarch",
            "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.tuxcare.els3.noarch",
            "AlmaLinux-9.2:frr-selinux-0:8.3.1-5.el9.2.alma.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}