Your message dated Sat, 14 Feb 2026 13:19:52 +0000
with message-id <[email protected]>
and subject line Bug#1119292: fixed in frr 10.5.1-3
has caused the Debian Bug report #1119292,
regarding frr: CVE-2025-61099 CVE-2025-61100 CVE-2025-61101 CVE-2025-61102
CVE-2025-61103 CVE-2025-61104 CVE-2025-61105 CVE-2025-61106 CVE-2025-61107
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1119292: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1119292
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: frr
Version: 10.4.1-3
Severity: important
Tags: security upstream
Forwarded: https://github.com/FRRouting/frr/issues/19471
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi,
The following vulnerabilities were published for frr.
CVE-2025-61099[0]:
| FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a
| NULL pointer dereference via the opaque_info_detail function at
| ospf_opaque.c. This vulnerability allows attackers to cause a Denial
| of Service (DoS) via a crafted LS Update packet.
CVE-2025-61100[1]:
| FRRouting/frr from v2.0 through v10.4.1 was discovered to contain a
| NULL pointer dereference via the ospf_opaque_lsa_dump function at
| ospf_opaque.c. This vulnerability allows attackers to cause a Denial
| of Service (DoS) under specific malformed LSA conditions.
CVE-2025-61101[2]:
| FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a
| NULL pointer dereference via the show_vty_ext_link_rmt_itf_addr
| function at ospf_ext.c. This vulnerability allows attackers to cause
| a Denial of Service (DoS) via a crafted OSPF packet.
CVE-2025-61102[3]:
| FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a
| NULL pointer dereference via the show_vty_ext_link_adj_sid function
| at ospf_ext.c. This vulnerability allows attackers to cause a Denial
| of Service (DoS) via a crafted OSPF packet.
CVE-2025-61105[4]:
| FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a
| NULL pointer dereference via the show_vty_link_info function at
| ospf_ext.c. This vulnerability allows attackers to cause a Denial of
| Service (DoS) via a crafted OSPF packet.
The upstream issue[5] and pull[6] request are yet open upstream.
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-61099
https://www.cve.org/CVERecord?id=CVE-2025-61099
[1] https://security-tracker.debian.org/tracker/CVE-2025-61100
https://www.cve.org/CVERecord?id=CVE-2025-61100
[2] https://security-tracker.debian.org/tracker/CVE-2025-61101
https://www.cve.org/CVERecord?id=CVE-2025-61101
[3] https://security-tracker.debian.org/tracker/CVE-2025-61102
https://www.cve.org/CVERecord?id=CVE-2025-61102
[4] https://security-tracker.debian.org/tracker/CVE-2025-61105
https://www.cve.org/CVERecord?id=CVE-2025-61105
[5] https://github.com/FRRouting/frr/issues/19471
[6] https://github.com/FRRouting/frr/pull/19480
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: frr
Source-Version: 10.5.1-3
Done: Daniel Baumann <[email protected]>
We believe that the bug you reported is fixed in the latest version of
frr, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Daniel Baumann <[email protected]> (supplier of updated frr package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 14 Feb 2026 13:50:29 +0100
Source: frr
Architecture: source
Version: 10.5.1-3
Distribution: sid
Urgency: medium
Maintainer: Daniel Baumann <[email protected]>
Changed-By: Daniel Baumann <[email protected]>
Closes: 1119292
Changes:
frr (10.5.1-3) sid; urgency=medium
.
* Adding patches from upstream to fix various NULL pointer dereferencing
in ospfd, thanks to Andreas Hasenack <[email protected]>
for cherry-picking them [CVE-2025-61099 CVE-2025-61100 CVE-2025-61101
CVE-2025-61102 CVE-2025-61103 CVE-2025-61104 CVE-2025-61105
CVE-2025-61106 CVE-2025-61107] (Closes: #1119292).
Checksums-Sha1:
41e68134d9ecfdfaf526b906c0aa283d1d5ad51c 2134 frr_10.5.1-3.dsc
28c0136249db6993c85cffcad310246188092951 35664 frr_10.5.1-3.debian.tar.xz
15912a81f48fa8ed6553b00e9359ad9afa7c0254 10958 frr_10.5.1-3_amd64.buildinfo
Checksums-Sha256:
0c2aa7fa42794f31b919408a25f41e7aedc358e02d3705beb3766d2660789b13 2134
frr_10.5.1-3.dsc
bc2900577bce38ae772070e4242518da53c1c38f020773834822c6c488e16e82 35664
frr_10.5.1-3.debian.tar.xz
4a13b758286c13bb105b9eed5d6447242f385df7a605278f729f205357023923 10958
frr_10.5.1-3_amd64.buildinfo
Files:
973050f982d76f57b20bec51cc8760e5 2134 net optional frr_10.5.1-3.dsc
1ff01be029e7a46c22d02c476fc8d69d 35664 net optional frr_10.5.1-3.debian.tar.xz
d4739620948c59bd683fee3c65935b40 10958 net optional
frr_10.5.1-3_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iHUEARYKAB0WIQQmmGg4gLaoSj0ERgL7tPDoCoAiLwUCaZBwzAAKCRD7tPDoCoAi
LyTiAQD1CRPWC5KGkW7hG3VGUlFX6SV83yLr8yf57MEX1Q/E+gEA88bkYzu+Mrb7
g6GJXL7q+t89/ut2EsEl6dTGT2RtVA4=
=As4C
-----END PGP SIGNATURE-----
pgpDgM_gDaPdM.pgp
Description: PGP signature
--- End Message ---