GHSA-39qr-rc93-vhqm

Suggest an improvement
Source
https://github.com/advisories/GHSA-39qr-rc93-vhqm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-39qr-rc93-vhqm/GHSA-39qr-rc93-vhqm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-39qr-rc93-vhqm
Aliases
  • CVE-2026-45047
Published
2026-05-11T16:17:48Z
Modified
2026-05-11T16:37:31.424850Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Bird-lg-go has a Fatal Out-of-Memory (OOM) Denial of Service via Unbounded JSON Decoding
Details

Summary

The apiHandler (and similarly webHandlerTelegramBot) processes user-provided JSON payloads by directly using json.NewDecoder(r.Body).Decode(&request) without restricting the maximum read size. An unauthenticated remote attacker can stream an extremely large, endless JSON payload (e.g., several Gigabytes of padding) over a single TCP connection. Because Go's JSON decoder attempts to allocate memory for the entire parsed structure, this rapidly exhausts the host's physical RAM or container limits, leading to an unrecoverable fatal error: runtime: out of memory.

This causes the Linux OOM Killer to instantly terminate the entire bird-lg-go daemon, resulting in a severe Remote Denial of Service (RDoS).

Details

In api.go: ```go func apiHandler(w http.ResponseWriter, r *http.Request) { var request apiRequest // VULNERABILITY: No http.MaxBytesReader protection before JSON decode err := json.NewDecoder(r.Body).Decode(&request) // ...

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-11T16:17:48Z",
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "HIGH",
    "nvd_published_at": null
}
References

Affected packages

Go / github.com/xddxdd/bird-lg-go

Package

Name
github.com/xddxdd/bird-lg-go
View open source insights on deps.dev
Purl
pkg:golang/github.com/xddxdd/bird-lg-go

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20260507060110-0ff87024cb9e

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-39qr-rc93-vhqm/GHSA-39qr-rc93-vhqm.json"