go-bitfield is a simple bitfield package for the go language aiming to be more performant that the standard library. When feeding untrusted user input into the size parameter of `NewBitfield` and `FromBytes` functions, an attacker can trigger `panic`s. This happen when the `size` is a not a multiple of `8` or is negative. There were already a note in the `NewBitfield` documentation, however known users of this package are subject to this issue. Users are advised to upgrade. Users unable to upgrade should ensure that `size` is a multiple of 8 before calling `NewBitfield` or `FromBytes`.
References
Link | Resource |
---|---|
https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579 | Patch |
https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r | Exploit Patch Vendor Advisory |
Configurations
History
07 Nov 2023, 04:07
Type | Values Removed | Values Added |
---|---|---|
Summary | go-bitfield is a simple bitfield package for the go language aiming to be more performant that the standard library. When feeding untrusted user input into the size parameter of `NewBitfield` and `FromBytes` functions, an attacker can trigger `panic`s. This happen when the `size` is a not a multiple of `8` or is negative. There were already a note in the `NewBitfield` documentation, however known users of this package are subject to this issue. Users are advised to upgrade. Users unable to upgrade should ensure that `size` is a multiple of 8 before calling `NewBitfield` or `FromBytes`. |
Information
Published : 2023-02-09 21:15
Updated : 2024-02-28 19:51
NVD link : CVE-2023-23626
Mitre link : CVE-2023-23626
CVE.ORG link : CVE-2023-23626
JSON object : View
Products Affected
protocol
- go-bitfield