Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03Mng0LWNxNnItanA0cM4AAtKS

Hyperledger Fabric vulnerable to Improper Input Validation in orderer/common/cluster consensus request

Impact

If a consensus client sends a malformed consensus request to an orderer it may crash the orderer node.
This fix checks for the malformed consensus request and returns an error to the consensus client.

Specific Go Packages Affected

github.com/hyperledger/fabric/orderer/common/cluster

Patches

Fixed in v2.2.7 and v2.4.5.

Workarounds

None, users must upgrade to v2.2.7 or v2.4.5.

References

https://github.com/hyperledger/fabric/releases/tag/v2.2.7
https://github.com/hyperledger/fabric/releases/tag/v2.4.5

For more information

If you have any questions or comments about this advisory:

Credits

Thank you to Haosheng Wang of OPPO ZIWU Security Lab for this disclosure.

Permalink: https://github.com/advisories/GHSA-72x4-cq6r-jp4p
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03Mng0LWNxNnItanA0cM4AAtKS
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 7 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-72x4-cq6r-jp4p, CVE-2022-31121
References: Repository: https://github.com/hyperledger/fabric
Blast Radius: 19.5

Affected Packages

go:github.com/hyperledger/fabric
Dependent packages: 322
Dependent repositories: 401
Downloads:
Affected Version Ranges: >= 2.3.0, < 2.4.5, < 2.2.7
Fixed in: 2.4.5, 2.2.7
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 1.3.0, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.4.7, 1.4.8, 1.4.9, 1.4.10, 1.4.11, 1.4.12, 2.0.0, 2.0.1, 2.1.0, 2.1.1
All unaffected versions: