The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 26 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack. | |
| Title | Denial of service in github.com/shamaton/msgpack | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-03-26T19:40:51.686Z
Reserved: 2026-03-11T16:38:46.556Z
Link: CVE-2026-32284
No data.
Status : Received
Published: 2026-03-26T20:16:12.087
Modified: 2026-03-26T20:16:12.087
Link: CVE-2026-32284
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.