Home

Description

A vulnerability was determined in osrg GoBGP up to 4.3.0. Affected by this vulnerability is the function parseRibEntry of the file pkg/packet/mrt/mrt.go. Executing a manipulation can lead to integer underflow. It is possible to launch the attack remotely. Upgrading to version 4.4.0 addresses this issue. This patch is called 76d911046344a3923cbe573364197aa081944592. It is suggested to upgrade the affected component.

PUBLISHED Reserved 2026-05-03 | Published 2026-05-04 | Updated 2026-05-04 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
7.5AV:N/AC:L/Au:N/C:P/I:P/A:P/E:ND/RL:OF/RC:C

Problem types

Integer Underflow

Numeric Error

Product status

4.0
affected

4.1
affected

4.2
affected

4.3.0
affected

4.4.0
unaffected

Timeline

2026-05-03:Advisory disclosed
2026-05-03:VulDB entry created
2026-05-03:VulDB entry last update

Credits

Sunxj (VulDB User) reporter

References

vuldb.com/vuln/360911 (VDB-360911 | osrg GoBGP mrt.go parseRibEntry integer underflow) vdb-entry technical-description

vuldb.com/vuln/360911/cti (VDB-360911 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/submit/807604 (Submit #807604 | osrg GoBGP <= 4.3.0 Integer Underflow) third-party-advisory

github.com/...ommit/76d911046344a3923cbe573364197aa081944592 patch

github.com/osrg/gobgp/releases/tag/v4.4.0 patch

github.com/osrg/gobgp/ product

cve.org (CVE-2026-7736)

nvd.nist.gov (CVE-2026-7736)

Download JSON