CVE-2023-46565

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-46565
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-46565.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-46565
Aliases
Related
Published
2024-04-29T20:15:08Z
Modified
2024-09-18T03:25:40.544646Z
Summary
[none]
Details

Buffer Overflow vulnerability in osrg gobgp commit 419c50dfac578daa4d11256904d0dc182f1a9b22 allows a remote attacker to cause a denial of service via the handlingError function in pkg/server/fsm.go.

References

Affected packages

Debian:11 / gobgp

Package

Name
gobgp
Purl
pkg:deb/debian/gobgp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.25.0-2
2.25.0-3
2.34.0-1

3.*

3.1.0-1~exp1
3.9.0-1
3.9.0-2
3.10.0-1
3.16.0-1
3.19.0-1
3.21.0-1
3.23.0-1
3.25.0-1
3.27.0-1
3.28.0-1
3.29.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / gobgp

Package

Name
gobgp
Purl
pkg:deb/debian/gobgp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.10.0-1
3.16.0-1
3.19.0-1
3.21.0-1
3.23.0-1
3.25.0-1
3.27.0-1
3.28.0-1
3.29.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / gobgp

Package

Name
gobgp
Purl
pkg:deb/debian/gobgp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.10.0-1
3.16.0-1
3.19.0-1
3.21.0-1
3.23.0-1
3.25.0-1
3.27.0-1
3.28.0-1
3.29.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}