The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack.
History

Fri, 27 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-805
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Shamaton
Shamaton msgpack
Vendors & Products Shamaton
Shamaton msgpack

Thu, 26 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack.
Title Denial of service in github.com/shamaton/msgpack
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published: 2026-03-26T19:40:51.686Z

Updated: 2026-03-26T19:40:51.686Z

Reserved: 2026-03-11T16:38:46.556Z

Link: CVE-2026-32284

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-26T20:16:12.087

Modified: 2026-03-26T20:16:12.087

Link: CVE-2026-32284

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-26T19:40:51Z

Links: CVE-2026-32284 - Bugzilla