Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p3w2-64xm-833j | GoBGP has a panic in AdjRib.Update via malformed BGP Update message (Nil Pointer Dereference) |
Mon, 11 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:osrg:gobgp:4.4.0:*:*:*:*:*:*:* |
Thu, 07 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Osrg
Osrg gobgp |
|
| Vendors & Products |
Osrg
Osrg gobgp |
Thu, 07 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GoBGP is an open source Border Gateway Protocol (BGP) implementation in the Go Programming Language. In version 4.4.0, an unauthenticated remote BGP peer can trigger a fatal panic in GoBGP by sending a specially crafted BGP UPDATE message. When the server receives a message with inconsistent attribute lengths, it improperly handles the internal state transition to a "withdraw" action, leading to a nil pointer dereference in the AdjRib.Update function. This causes the entire GoBGP process to crash, resulting in a complete loss of service availability. This issue has been patched in version 4.5.0. | |
| Title | GoBGP: Panic in AdjRib.Update via malformed BGP Update message (Nil Pointer Dereference) | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T13:04:56.019Z
Reserved: 2026-04-26T12:13:55.551Z
Link: CVE-2026-42285
Updated: 2026-05-07T13:04:50.300Z
Status : Analyzed
Published: 2026-05-07T12:16:18.180
Modified: 2026-05-11T15:22:48.177
Link: CVE-2026-42285
No data.
OpenCVE Enrichment
Updated: 2026-05-07T15:00:13Z
Github GHSA