Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1xMjY0LXc5N3EtcTc3OM4AAxiG

Denial of service via HAMT Decoding Panics

Impact

Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.
If you are reading untrusted user input, an attacker can then trigger a panic.

This is caused by bogus fanout parameter in the HAMT directory nodes.
This include checks returned in ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r, as well as limiting the fanout to <= 1024 (to avoid attempts of arbitrary sized allocations).

Patches

Workarounds

Do not feed untrusted user data to the decoding functions.

References

Permalink: https://github.com/advisories/GHSA-q264-w97q-q778
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xMjY0LXc5N3EtcTc3OM4AAxiG
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: 11 months ago


CVSS Score: 5.9
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-q264-w97q-q778, CVE-2023-23625
References: Repository: https://github.com/ipfs/go-unixfs
Blast Radius: 17.7

Affected Packages

go:github.com/ipfs/go-unixfs
Dependent packages: 751
Dependent repositories: 996
Downloads:
Affected Version Ranges: < 0.4.3
Fixed in: 0.4.3
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.1.0, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.2.6, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2
All unaffected versions: 0.4.3, 0.4.4, 0.4.5, 0.4.6