Bug 2451851 (CVE-2026-32284)

Summary: CVE-2026-32284 github.com/shamaton/msgpack: msgpack: Denial of Service via truncated fixext data
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: akostadi, alinfoot, amasferr, anthomas, bbrownin, bdettelb, caswilli, derez, dmayorov, doconnor, dschmidt, dtrifiro, ehelms, erezende, ggainey, gotiwari, jcantril, jdobes, jgrulich, jhorak, jkoehler, jlanda, jlledo, juwatts, jvasik, jwong, kaycoth, kgaikwad, kshier, lichen, lphiri, mhulan, mvyas, nmoumoul, omaciel, orabin, osousa, pantinor, pcreech, rblanco, rbryant, rchan, rojacob, simaishi, smallamp, smcdonal, stcannon, teagle, tmalecek, tpopela, tsedmik, ttakamiy, vmugicag, weaton, xialiu, xiaoxwan, yguenane, zzhou
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the msgpack decoder. A remote attacker could send specially crafted, truncated fixext data to an application using the msgpack library. This improper input validation can lead to an out-of-bounds read and a runtime panic, resulting in a denial of service (DoS) attack against the application.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2026-03-26 20:02:41 UTC
The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack.