Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8rxh-r2p6-7f2q | GoBGP has Remote Denial of Service (Panic) in UpdatePathAttrs4ByteAs via Malformed BGP UPDATE |
Thu, 07 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:osrg:gobgp:*:*:*:*:*:*:*:* |
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Osrg
Osrg gobgp |
|
| Vendors & Products |
Osrg
Osrg gobgp |
Thu, 07 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GoBGP is an open source Border Gateway Protocol (BGP) implementation in the Go Programming Language. Prior to version 4.3.0, a remote Denial of Service (DoS) vulnerability exists in GoBGP where a malformed BGP UPDATE message can trigger a runtime error: index out of range panic. This occurs during the processing of 4-byte AS attributes when the message structure causes an internal slice index shift that is not properly handled. This issue has been patched in version 4.3.0. | |
| Title | GoBGP: Remote Denial of Service (Panic) in UpdatePathAttrs4ByteAs via Malformed BGP UPDATE | |
| Weaknesses | CWE-129 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T13:39:04.425Z
Reserved: 2026-04-21T23:58:43.802Z
Link: CVE-2026-41643
Updated: 2026-05-07T13:38:03.249Z
Status : Analyzed
Published: 2026-05-07T12:16:17.623
Modified: 2026-05-07T19:43:46.187
Link: CVE-2026-41643
No data.
OpenCVE Enrichment
Updated: 2026-05-07T15:00:13Z
Github GHSA