VYPR
Medium severity5.3NVD Advisory· Published May 4, 2026· Updated May 6, 2026

CVE-2026-7737

CVE-2026-7737

Description

A vulnerability was identified in osrg GoBGP up to 4.3.0. Affected by this issue is the function BMPPeerUpNotification.ParseBody/BMPStatisticsReport.ParseBody of the file pkg/packet/bmp/bmp.go of the component BMP Parser. The manipulation leads to out-of-bounds read. The attack can be initiated remotely. Upgrading to version 4.4.0 can resolve this issue. The identifier of the patch is bc77597d42335c78464bc8e15a471d887bbdf260. Upgrading the affected component is recommended.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/osrg/gobgpGo
< 4.4.04.4.0

Affected products

2
  • Osrg/Gobgpinferred2 versions
    <=4.3.0+ 1 more
    • (no CPE)range: <=4.3.0
    • cpe:2.3:a:osrg:gobgp:*:*:*:*:*:*:*:*range: <4.4.0

Patches

1
bc77597d4233

packet/bmp: validate ParseBody input length before reading fields

https://github.com/osrg/gobgpFUJITA TomonoriApr 1, 2026via ghsa
1 file changed · +6 0
  • pkg/packet/bmp/bmp.go+6 0 modified
    @@ -360,6 +360,9 @@ func NewBMPStatisticsReport(p BMPPeerHeader, stats []BMPStatsTLVInterface) *BMPM
     }
     
     func (body *BMPStatisticsReport) ParseBody(msg *BMPMessage, data []byte, options ...*bgp.MarshallingOption) error {
    +	if len(data) < 4 {
    +		return fmt.Errorf("BMP Statistics Report body too short: %d bytes", len(data))
    +	}
     	body.Count = binary.BigEndian.Uint32(data[:4])
     	data = data[4:]
     	for len(data) >= 4 {
    @@ -548,6 +551,9 @@ func NewBMPPeerUpNotification(p BMPPeerHeader, lAddr netip.Addr, lPort, rPort ui
     }
     
     func (body *BMPPeerUpNotification) ParseBody(msg *BMPMessage, data []byte, options ...*bgp.MarshallingOption) error {
    +	if len(data) < 20 {
    +		return fmt.Errorf("BMP Peer Up Notification body too short: %d bytes", len(data))
    +	}
     	if msg.PeerHeader.PeerType != BMP_PEER_TYPE_LOCAL_RIB && msg.PeerHeader.Flags&BMP_PEER_FLAG_IPV6 != 0 {
     		body.LocalAddress, _ = netip.AddrFromSlice(data[:16])
     	} else {
    

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.