Debian Package Tracker
Register | Log in
Subscribe

gobgp

Choose email to subscribe with

general
  • source: gobgp (main)
  • version: 3.36.0-2
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Mathias Gibbens [DMD] – Vincent Bernat [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 2.25.0-2
  • stable: 3.10.0-1
  • testing: 3.36.0-2
  • unstable: 3.36.0-2
versioned links
  • 2.25.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.10.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.36.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gobgpd
  • golang-github-osrg-gobgp-dev
action needed
A new upstream version is available: 3.37.0 high
A new upstream version 3.37.0 is available, you should consider packaging it.
Created: 2025-05-09 Last update: 2025-07-19 15:30
2 security issues in trixie high

There are 2 open security issues in trixie.

1 important issue:
  • CVE-2025-7464: A vulnerability classified as problematic has been found in osrg GoBGP up to 3.37.0. Affected is the function SplitRTR of the file pkg/packet/rtr/rtr.go. The manipulation leads to out-of-bounds read. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The name of the patch is e748f43496d74946d14fed85c776452e47b99d64. It is recommended to apply a patch to fix this issue.
1 issue postponed or untriaged:
  • CVE-2023-46565: (postponed; to be fixed through a stable update) Buffer Overflow vulnerability in osrg gobgp commit 419c50dfac578daa4d11256904d0dc182f1a9b22 allows a remote attacker to cause a denial of service via the handlingError function in pkg/server/fsm.go.
Created: 2025-07-12 Last update: 2025-07-16 14:32
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2025-7464: A vulnerability classified as problematic has been found in osrg GoBGP up to 3.37.0. Affected is the function SplitRTR of the file pkg/packet/rtr/rtr.go. The manipulation leads to out-of-bounds read. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The name of the patch is e748f43496d74946d14fed85c776452e47b99d64. It is recommended to apply a patch to fix this issue.
  • CVE-2023-46565: Buffer Overflow vulnerability in osrg gobgp commit 419c50dfac578daa4d11256904d0dc182f1a9b22 allows a remote attacker to cause a denial of service via the handlingError function in pkg/server/fsm.go.
Created: 2024-05-01 Last update: 2025-07-16 14:32
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-03-08 Last update: 2025-07-19 19:31
6 low-priority security issues in bookworm low

There are 6 open security issues in bookworm.

6 issues left for the package maintainer to handle:
  • CVE-2025-7464: (needs triaging) A vulnerability classified as problematic has been found in osrg GoBGP up to 3.37.0. Affected is the function SplitRTR of the file pkg/packet/rtr/rtr.go. The manipulation leads to out-of-bounds read. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The name of the patch is e748f43496d74946d14fed85c776452e47b99d64. It is recommended to apply a patch to fix this issue.
  • CVE-2023-46565: (postponed; to be fixed through a stable update) Buffer Overflow vulnerability in osrg gobgp commit 419c50dfac578daa4d11256904d0dc182f1a9b22 allows a remote attacker to cause a denial of service via the handlingError function in pkg/server/fsm.go.
  • CVE-2025-43970: (needs triaging) An issue was discovered in GoBGP before 3.35.0. pkg/packet/mrt/mrt.go does not properly check the input length, e.g., by ensuring that there are 12 bytes or 36 bytes (depending on the address family).
  • CVE-2025-43971: (needs triaging) An issue was discovered in GoBGP before 3.35.0. pkg/packet/bgp/bgp.go allows attackers to cause a panic via a zero value for softwareVersionLen.
  • CVE-2025-43972: (needs triaging) An issue was discovered in GoBGP before 3.35.0. An attacker can cause a crash in the pkg/packet/bgp/bgp.go flowspec parser by sending fewer than 20 bytes in a certain context.
  • CVE-2025-43973: (needs triaging) An issue was discovered in GoBGP before 3.35.0. pkg/packet/rtr/rtr.go does not verify that the input length corresponds to a situation in which all bytes are available for an RTR message.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-05-01 Last update: 2025-07-16 14:32
debian/patches: 1 patch to forward upstream low

Among the 2 debian patches available in version 3.36.0-2 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-04-28 06:30
news
[rss feed]
  • [2025-05-08] gobgp 3.36.0-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-27] Accepted gobgp 3.36.0-2 (source) into unstable (Mathias Gibbens)
  • [2025-04-08] gobgp 3.36.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-05] Accepted gobgp 3.36.0-1 (source) into unstable (Mathias Gibbens)
  • [2025-03-09] gobgp 3.35.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-04] Accepted gobgp 3.35.0-1 (source) into unstable (Mathias Gibbens)
  • [2025-01-14] gobgp 3.33.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-11] Accepted gobgp 3.33.0-1 (source) into unstable (Mathias Gibbens)
  • [2024-12-07] gobgp 3.32.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-05] Accepted gobgp 3.32.0-1 (source) into unstable (Mathias Gibbens)
  • [2024-11-15] gobgp 3.31.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-13] Accepted gobgp 3.31.0-1 (source) into unstable (Mathias Gibbens)
  • [2024-10-06] gobgp 3.30.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-04] Accepted gobgp 3.30.0-1 (source) into unstable (Mathias Gibbens)
  • [2024-08-18] gobgp 3.29.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-10] Accepted gobgp 3.29.0-1 (source) into unstable (Mathias Gibbens)
  • [2024-07-17] gobgp 3.28.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-14] Accepted gobgp 3.28.0-1 (source) into unstable (Mathias Gibbens)
  • [2024-06-23] gobgp 3.27.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-06-19] Accepted gobgp 3.27.0-1 (source) into unstable (Mathias Gibbens)
  • [2024-04-23] gobgp 3.25.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-14] Accepted gobgp 3.25.0-1 (source) into unstable (Mathias Gibbens)
  • [2024-02-18] gobgp 3.23.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-09] Accepted gobgp 3.23.0-1 (source) into unstable (Mathias Gibbens)
  • [2023-12-26] gobgp 3.21.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-23] Accepted gobgp 3.21.0-1 (source) into unstable (Mathias Gibbens)
  • [2023-10-12] gobgp 3.19.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-07] Accepted gobgp 3.19.0-1 (source) into unstable (Mathias Gibbens)
  • [2023-07-23] gobgp 3.16.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-07-20] Accepted gobgp 3.16.0-1 (source) into unstable (Mathias Gibbens)
  • 1
  • 2
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.36.0-2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing