Source: gobgp
Version: 4.3.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>




*** /tmp/gobgp.reportbug
Package: gobgp
X-Debbugs-CC: [email protected]
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for gobgp.

CVE-2026-5122[0]:
| A security flaw has been discovered in osrg GoBGP up to 4.3.0. This
| affects the function DecodeFromBytes of the file
| pkg/packet/bgp/bgp.go of the component BGP OPEN Message Handler.
| Performing a manipulation of the argument domainNameLen results in
| improper access controls. The attack may be initiated remotely. A
| high degree of complexity is needed for the attack. The
| exploitability is reported as difficult. The patch is named
| 2b09db390a3d455808363c53e409afe6b1b86d2d. It is suggested to install
| a patch to address this issue.


CVE-2026-5123[1]:
| A weakness has been identified in osrg GoBGP up to 4.3.0. This
| impacts the function DecodeFromBytes of the file
| pkg/packet/bgp/bgp.go. Executing a manipulation of the argument
| data[1] can lead to off-by-one. The attack may be launched remotely.
| Attacks of this nature are highly complex. The exploitability is
| said to be difficult. This patch is called
| 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied
| to remediate this issue.


CVE-2026-5124[2]:
| A security vulnerability has been detected in osrg GoBGP up to
| 4.3.0. Affected is the function BGPHeader.DecodeFromBytes of the
| file pkg/packet/bgp/bgp.go of the component BGP Header Handler. The
| manipulation leads to improper access controls. Remote exploitation
| of the attack is possible. The attack is considered to have high
| complexity. The exploitability is told to be difficult. The
| identifier of the patch is f0f24a2a901cbf159260698211ab15c583ced131.
| To fix this issue, it is recommended to deploy a patch.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-5122
    https://www.cve.org/CVERecord?id=CVE-2026-5122
    https://github.com/osrg/gobgp/pull/3343
[1] https://security-tracker.debian.org/tracker/CVE-2026-5123
    https://www.cve.org/CVERecord?id=CVE-2026-5123
    https://github.com/osrg/gobgp/pull/3342
[2] https://security-tracker.debian.org/tracker/CVE-2026-5124
    https://www.cve.org/CVERecord?id=CVE-2026-5124
    https://github.com/osrg/gobgp/pull/3340

Regards,
Salvatore

Reply via email to