The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-805 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 27 Mar 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-119 |
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shamaton
Shamaton msgpack |
|
| Vendors & Products |
Shamaton
Shamaton msgpack |
Thu, 26 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack. | |
| Title | Denial of service in github.com/shamaton/msgpack | |
| References |
|
Status: PUBLISHED
Assigner: Go
Published: 2026-03-26T19:40:51.686Z
Updated: 2026-03-26T19:40:51.686Z
Reserved: 2026-03-11T16:38:46.556Z
Link: CVE-2026-32284
No data.
Status : Received
Published: 2026-03-26T20:16:12.087
Modified: 2026-03-26T20:16:12.087
Link: CVE-2026-32284