Untriaged
Permalink
CVE-2026-5123
3.7 LOW
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
osrg GoBGP bgp.go DecodeFromBytes off-by-one
A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied to remediate this issue.
References
-
-
-
Submit #780179 | osrg GoBGP 4.3.0 Off-by-one Error third-party-advisory
-
-
https://github.com/osrg/gobgp/ product
Affected products
GoBGP
- ==4.1
- ==4.0
- ==4.3.0
- ==4.2
Matching in nixpkgs
pkgs.gobgp
CLI tool for GoBGP
Package maintainers
-
@higebu Yuya Kusakabe <yuya.kusakabe@gmail.com>