A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied to remediate this issue.
References
| Link | Resource |
|---|---|
| https://github.com/osrg/gobgp/ | Product |
| https://github.com/osrg/gobgp/commit/67c059413470df64bc20801c46f64058e88f800f | Patch |
| https://github.com/osrg/gobgp/pull/3342 | Issue Tracking |
| https://vuldb.com/submit/780179 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/354155 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/354155/cti | Permissions Required VDB Entry |
Configurations
History
06 Apr 2026, 15:46
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/osrg/gobgp/ - Product | |
| References | () https://github.com/osrg/gobgp/commit/67c059413470df64bc20801c46f64058e88f800f - Patch | |
| References | () https://github.com/osrg/gobgp/pull/3342 - Issue Tracking | |
| References | () https://vuldb.com/submit/780179 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/354155 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/354155/cti - Permissions Required, VDB Entry | |
| CPE | cpe:2.3:a:osrg:gobgp:*:*:*:*:*:*:*:* | |
| First Time |
Osrg gobgp
Osrg |
01 Apr 2026, 14:24
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
30 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-30 16:16
Updated : 2026-04-06 15:46
NVD link : CVE-2026-5123
Mitre link : CVE-2026-5123
CVE.ORG link : CVE-2026-5123
JSON object : View
Products Affected
osrg
- gobgp
