Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7235-89m6-f4px | GoBGP has Remote Denial of Service (Panic) via Malformed Well-known Path Attribute |
Thu, 07 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:osrg:gobgp:4.3.0:*:*:*:*:*:*:* |
Thu, 07 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Osrg
Osrg gobgp |
|
| Vendors & Products |
Osrg
Osrg gobgp |
Thu, 07 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GoBGP is an open source Border Gateway Protocol (BGP) implementation in the Go Programming Language. In version 4.3.0, a remote Denial of Service (DoS) vulnerability exists in GoBGP due to a nil pointer dereference. When a malformed BGP UPDATE message contains an unrecognized Path Attribute marked as "Well-known," the daemon fails to interrupt the message handling flow. This results in an illegal memory access and a full process crash (panic). This issue has been patched in version 4.4.0. | |
| Title | GoBGP: Remote Denial of Service (Panic) via Malformed Well-known Path Attribute | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T12:34:38.588Z
Reserved: 2026-04-21T23:58:43.801Z
Link: CVE-2026-41642
Updated: 2026-05-07T12:32:47.501Z
Status : Analyzed
Published: 2026-05-07T12:16:17.460
Modified: 2026-05-07T19:46:05.597
Link: CVE-2026-41642
No data.
OpenCVE Enrichment
Updated: 2026-05-07T15:45:32Z
Github GHSA