On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping.
Fixes

Solution

No solution given by the vendor.


Workaround

The workaround is to disable the Dynamic Path Selection (DPS) service inside BGP LinkState by disabling the feature toggle. Note this should be done on affected non AWE platforms only. 1. Enter "bash" shell under EOS prompt 2. sudo sh -c 'echo "BgpLsConsumerDps=0" > /mnt/flash/toggle_override; echo "BgpLsProducerDps=0" >> /mnt/flash/toggle_override' 3. Reload the switch or router

History

Tue, 04 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Mar 2025 20:30:00 +0000

Type Values Removed Values Added
Description On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping.
Title On affected platforms running Arista EOS with BGP Link State configured, BGP peer flap can cause the BGP agent to leak memory. This may result in BGP routing processing being terminated and route flapping.
Weaknesses CWE-401
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Arista

Published:

Updated: 2025-03-04T20:34:15.951Z

Reserved: 2024-09-23T23:03:07.318Z

Link: CVE-2024-9135

cve-icon Vulnrichment

Updated: 2025-03-04T20:33:58.136Z

cve-icon NVD

Status : Received

Published: 2025-03-04T21:15:12.360

Modified: 2025-03-04T21:15:12.360

Link: CVE-2024-9135

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.