Hi Matthias,
On Sat, Apr 05, 2025 at 02:23:26PM +, Mathias Gibbens wrote:
> It is claimed that this was fixed in the 3.20.0 release[0,1,2] (or
> maybe 3.21.0[3]), which would have been fixed in Debian with the
> 3.21.0-1 upload.
>
> However, the upstream bug report[4] is still open, and I
It is claimed that this was fixed in the 3.20.0 release[0,1,2] (or
maybe 3.21.0[3]), which would have been fixed in Debian with the
3.21.0-1 upload.
However, the upstream bug report[4] is still open, and I don't see
anything in the commit or release notes indicating a fix for this
issue. Since
Source: gobgp
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for gobgp.
CVE-2023-46565[0]:
| Buffer Overflow vulnerability in osrg gobgp commit
| 419c50dfac578daa4d11256904d0dc182f1a9b22 allows a remote attacker to
| cause
3 matches
Mail list logo