
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability classified as problematic was discovered in osrg GoBGP versions up to 3.37.0, identified as CVE-2025-7464. The vulnerability affects the SplitRTR function in the pkg/packet/rtr/rtr.go file, leading to an out-of-bounds read condition. The issue was discovered and disclosed on July 11, 2025 (VulDB).
The vulnerability is related to improper memory buffer operations in the SplitRTR function. The issue occurs when the function attempts to access data without proper bounds checking, which can result in an out-of-bounds read condition. The vulnerability has been assigned CWE-125 (Out-of-bounds Read) and CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). The CVSS v3.1 base score is 3.7 (LOW), indicating relatively low severity (NVD, VulDB).
The vulnerability primarily affects the availability of the system. When exploited, it can lead to out-of-bounds memory access, potentially causing the application to crash or behave unpredictably (VulDB).
A patch has been released to address this vulnerability. The fix is identified by commit hash e748f43496d74946d14fed85c776452e47b99d64. It is strongly recommended to update to the patched version of the software (GitHub).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."