Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03Mng0LWNxNnItanA0cM4AAtKS
Hyperledger Fabric vulnerable to Improper Input Validation in orderer/common/cluster consensus request
Impact
If a consensus client sends a malformed consensus request to an orderer it may crash the orderer node.
This fix checks for the malformed consensus request and returns an error to the consensus client.
Specific Go Packages Affected
github.com/hyperledger/fabric/orderer/common/cluster
Patches
Fixed in v2.2.7 and v2.4.5.
Workarounds
None, users must upgrade to v2.2.7 or v2.4.5.
References
https://github.com/hyperledger/fabric/releases/tag/v2.2.7
https://github.com/hyperledger/fabric/releases/tag/v2.4.5
For more information
If you have any questions or comments about this advisory:
- Open an issue in Hyperledger Fabric repository
Credits
Thank you to Haosheng Wang of OPPO ZIWU Security Lab for this disclosure.
Permalink: https://github.com/advisories/GHSA-72x4-cq6r-jp4pJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03Mng0LWNxNnItanA0cM4AAtKS
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: over 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Percentage: 0.00284
EPSS Percentile: 0.68252
Identifiers: GHSA-72x4-cq6r-jp4p, CVE-2022-31121
References:
- https://github.com/hyperledger/fabric/security/advisories/GHSA-72x4-cq6r-jp4p
- https://nvd.nist.gov/vuln/detail/CVE-2022-31121
- https://github.com/hyperledger/fabric/commit/0f18359493bcbd5f9f9d1a9b05adabfe5da23b06
- https://github.com/hyperledger/fabric/releases/tag/v2.2.7
- https://github.com/hyperledger/fabric/releases/tag/v2.4.5
- https://github.com/advisories/GHSA-72x4-cq6r-jp4p
Blast Radius: 19.5
Affected Packages
go:github.com/hyperledger/fabric
Dependent packages: 322Dependent repositories: 401
Downloads:
Affected Version Ranges: >= 2.3.0, < 2.4.5, < 2.2.7
Fixed in: 2.4.5, 2.2.7
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 1.3.0, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.4.7, 1.4.8, 1.4.9, 1.4.10, 1.4.11, 1.4.12, 2.0.0, 2.0.1, 2.1.0, 2.1.1
All unaffected versions: