Packages
- gobgp - BGP implementation in Go
Details
It was discovered that GoBGP did not properly manage memory under
certain circumstances, which could lead to a buffer overflow. An
attacker could possibly use this issue to cause a denial of service. This
issue was only addressed in Ubuntu 22.04 LTS and Ubuntu 20.04 LTS.
(CVE-2023-46565)
It was discovered that GoBGP did not properly verify the length of
certain inputs. An attacker could possibly use this issue to cause a
panic resulting in a denial of service.
(CVE-2025-43970, CVE-2025-43971, CVE-2025-43972, CVE-2025-43973)
It was discovered that GoBGP did not properly manage memory under
certain circumstances, which could lead to a buffer overflow. An
attacker could possibly use this issue to cause a denial of service. This
issue was only addressed in Ubuntu 22.04 LTS and Ubuntu 20.04 LTS.
(CVE-2023-46565)
It was discovered that GoBGP did not properly verify the length of
certain inputs. An attacker could possibly use this issue to cause a
panic resulting in a denial of service.
(CVE-2025-43970, CVE-2025-43971, CVE-2025-43972, CVE-2025-43973)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
24.04 noble | gobgpd – 3.23.0-1ubuntu0.3+esm2 | ||
golang-github-osrg-gobgp-dev – 3.23.0-1ubuntu0.3+esm2 | |||
22.04 jammy | gobgpd – 2.25.0-3ubuntu0.1+esm2 | ||
golang-github-osrg-gobgp-dev – 2.25.0-3ubuntu0.1+esm2 | |||
20.04 focal | gobgpd – 2.12.0-1ubuntu0.1~esm2 | ||
golang-github-osrg-gobgp-dev – 2.12.0-1ubuntu0.1~esm2 | |||
18.04 bionic | gobgpd – 1.29-1ubuntu0.1+esm1 | ||
golang-github-osrg-gobgp-dev – 1.29-1ubuntu0.1+esm1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.