CVE-2023-25568

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-25568
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-25568.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-25568
Aliases
Related
Published
2023-05-10T14:15:32Z
Modified
2025-07-02T00:25:23.848776Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Boxo, formerly known as go-libipfs, is a library for building IPFS applications and implementations. In versions 0.4.0 and 0.5.0, if an attacker is able allocate arbitrary many bytes in the Bitswap server, those allocations are lasting even if the connection is closed. This affects users accepting untrusted connections with the Bitswap server and also affects users using the old API stubs at github.com/ipfs/go-libipfs/bitswap because users then transitively import github.com/ipfs/go-libipfs/bitswap/server. Boxo versions 0.6.0 and 0.4.1 contain a patch for this issue. As a workaround, those who are using the stub object at github.com/ipfs/go-libipfs/bitswap not taking advantage of the features provided by the server can refactor their code to use the new split API that will allow them to run in a client only mode: github.com/ipfs/go-libipfs/bitswap/client.

References

Affected packages

Git / github.com/ipfs/boxo

Affected ranges

Type
GIT
Repo
https://github.com/ipfs/boxo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Fixed

Affected versions

v0.*

v0.1.0
v0.2.0
v0.3.0
v0.4.0
v0.5.0