CVE-2023-23631

github.com/ipfs/go-unixfsnode is an ADL IPLD prime node that wraps go-codec-dagpb's implementation of protobuf to enable pathing. In versions priot to 1.5.2 trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus fanout parameter in the HAMT directory nodes. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:protocol:go-unixfsnode:*:*:*:*:*:go:*:*

History

21 Nov 2024, 07:46

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.9
References () https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076 - Patch () https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076 - Patch
References () https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68 - Patch () https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68 - Patch
References () https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122 - Patch () https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122 - Patch
References () https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc - Patch, Vendor Advisory () https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc - Patch, Vendor Advisory
Summary
  • (es) github.com/ipfs/go-unixfsnode es un nodo principal de ADL IPLD que envuelve la implementación de protobuf de go-codec-dagpb para habilitar la ruta. En versiones anteriores a la 1.5.2, intentar leer directorios fragmentados con HAMT con formato incorrecto puede provocar pánico y pérdidas de memoria virtual. Si está leyendo entradas de usuarios que no son de confianza, un atacante puede provocar pánico. Esto se debe a un parámetro de distribución falso en los nodos del directorio HAMT. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.

07 Nov 2023, 04:07

Type Values Removed Values Added
Summary github.com/ipfs/go-unixfsnode is an ADL IPLD prime node that wraps go-codec-dagpb's implementation of protobuf to enable pathing. In versions priot to 1.5.2 trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus fanout parameter in the HAMT directory nodes. Users are advised to upgrade. There are no known workarounds for this vulnerability. github.com/ipfs/go-unixfsnode is an ADL IPLD prime node that wraps go-codec-dagpb's implementation of protobuf to enable pathing. In versions priot to 1.5.2 trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus fanout parameter in the HAMT directory nodes. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Information

Published : 2023-02-09 21:15

Updated : 2024-11-21 07:46


NVD link : CVE-2023-23631

Mitre link : CVE-2023-23631

CVE.ORG link : CVE-2023-23631


JSON object : View

Products Affected

protocol

  • go-unixfsnode
CWE
CWE-400

Uncontrolled Resource Consumption