No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 05 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out‑of‑Bounds Read in gobgp Leading to DoS |
Tue, 05 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 04 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out‑of‑Bounds Read in gobgp Leading to DoS | |
| First Time appeared |
Osrg
Osrg gobgp |
|
| Weaknesses | CWE-125 | |
| Vendors & Products |
Osrg
Osrg gobgp |
Mon, 04 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An out-of-bounds read in the ParseIP6Extended function (/bgp/bgp.go) of gobgp v4.3.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted BGP UPDATE message. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-05T16:03:08.662Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-37461
Updated: 2026-05-05T15:29:15.210Z
Status : Awaiting Analysis
Published: 2026-05-04T17:16:23.230
Modified: 2026-05-07T15:53:49.717
Link: CVE-2026-37461
No data.
OpenCVE Enrichment
Updated: 2026-05-05T17:45:06Z