UBUNTU-CVE-2023-46565

Source
https://ubuntu.com/security/CVE-2023-46565
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-46565.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-46565
Related
Published
2024-04-29T20:15:00Z
Modified
2024-10-15T14:11:49Z
Summary
[none]
Details

Buffer Overflow vulnerability in osrg gobgp commit 419c50dfac578daa4d11256904d0dc182f1a9b22 allows a remote attacker to cause a denial of service via the handlingError function in pkg/server/fsm.go.

References

Affected packages

Ubuntu:Pro:18.04:LTS / gobgp

Package

Name
gobgp
Purl
pkg:deb/ubuntu/gobgp?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.15-1
1.29-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / gobgp

Package

Name
gobgp
Purl
pkg:deb/ubuntu/gobgp?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.33-1

2.*

2.11.0-1
2.12.0-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / gobgp

Package

Name
gobgp
Purl
pkg:deb/ubuntu/gobgp?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.25.0-2
2.25.0-3
2.25.0-3build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / gobgp

Package

Name
gobgp
Purl
pkg:deb/ubuntu/gobgp?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.23.0-1
3.25.0-1
3.27.0-1
3.28.0-1
3.29.0-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / gobgp

Package

Name
gobgp
Purl
pkg:deb/ubuntu/gobgp?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.16.0-1build1
3.19.0-1
3.21.0-1
3.23.0-1
3.23.0-1ubuntu0.1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}