GHSA-4gj3-6r43-3wfc

Suggest an improvement
Source
https://github.com/advisories/GHSA-4gj3-6r43-3wfc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-4gj3-6r43-3wfc/GHSA-4gj3-6r43-3wfc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4gj3-6r43-3wfc
Aliases
Related
Published
2023-02-10T19:54:14Z
Modified
2023-11-08T04:11:41.979396Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
IPFS go-unixfsnode subject to DOS via HAMT Decoding Panics
Details

Impact

Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic.

This is caused by a bogus fanout parameter in the HAMT directory nodes. This includes checks returned in ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r, as well as limiting the fanout to <= 1024 (to avoid attempts of arbitrary sized allocations).

Patches

  • https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68
  • https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122

References

  • https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778
  • https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r
Database specific
{
    "nvd_published_at": "2023-02-09T21:15:00Z",
    "github_reviewed_at": "2023-02-10T19:54:14Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

Go / github.com/ipfs/go-unixfsnode

Package

Name
github.com/ipfs/go-unixfsnode
View open source insights on deps.dev
Purl
pkg:golang/github.com/ipfs/go-unixfsnode

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.2