It was discovered that GoBGP did not properly manage memory under certain circumstances, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 22.04 LTS and Ubuntu 20.04 LTS. (CVE-2023-46565)
It was discovered that GoBGP did not properly verify the length of certain inputs. An attacker could possibly use this issue to cause a panic resulting in a denial of service. (CVE-2025-43970, CVE-2025-43971, CVE-2025-43972, CVE-2025-43973)
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.29-1ubuntu0.1+esm1", "binary_name": "gobgpd" }, { "binary_version": "1.29-1ubuntu0.1+esm1", "binary_name": "gobgpd-dbgsym" }, { "binary_version": "1.29-1ubuntu0.1+esm1", "binary_name": "golang-github-osrg-gobgp-dev" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.12.0-1ubuntu0.1~esm2", "binary_name": "gobgpd" }, { "binary_version": "2.12.0-1ubuntu0.1~esm2", "binary_name": "gobgpd-dbgsym" }, { "binary_version": "2.12.0-1ubuntu0.1~esm2", "binary_name": "golang-github-osrg-gobgp-dev" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "2.25.0-3ubuntu0.1+esm2", "binary_name": "gobgpd" }, { "binary_version": "2.25.0-3ubuntu0.1+esm2", "binary_name": "gobgpd-dbgsym" }, { "binary_version": "2.25.0-3ubuntu0.1+esm2", "binary_name": "golang-github-osrg-gobgp-dev" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "3.23.0-1ubuntu0.3+esm2", "binary_name": "gobgpd" }, { "binary_version": "3.23.0-1ubuntu0.3+esm2", "binary_name": "gobgpd-dbgsym" }, { "binary_version": "3.23.0-1ubuntu0.3+esm2", "binary_name": "golang-github-osrg-gobgp-dev" } ] }