Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xMjY0LXc5N3EtcTc3OM4AAxiG
Denial of service via HAMT Decoding Panics
Impact
Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.
If you are reading untrusted user input, an attacker can then trigger a panic.
This is caused by bogus fanout
parameter in the HAMT directory nodes.
This include checks returned in ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r, as well as limiting the fanout
to <= 1024
(to avoid attempts of arbitrary sized allocations).
Patches
Workarounds
Do not feed untrusted user data to the decoding functions.
References Permalink: https://github.com/advisories/GHSA-q264-w97q-q778
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xMjY0LXc5N3EtcTc3OM4AAxiG
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 1 year ago
Updated: 11 months ago
CVSS Score: 5.9
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-q264-w97q-q778, CVE-2023-23625
References:
- https://github.com/ipfs/go-unixfs/security/advisories/GHSA-q264-w97q-q778
- https://nvd.nist.gov/vuln/detail/CVE-2023-23625
- https://github.com/ipfs/go-unixfs/commit/467d139a640ecee4f2e74643dafcc58bb3b54175
- https://pkg.go.dev/vuln/GO-2023-1557
- https://github.com/advisories/GHSA-q264-w97q-q778
Blast Radius: 17.7
Affected Packages
go:github.com/ipfs/go-unixfs
Dependent packages: 751Dependent repositories: 996
Downloads:
Affected Version Ranges: < 0.4.3
Fixed in: 0.4.3
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.1.0, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.2.6, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2
All unaffected versions: 0.4.3, 0.4.4, 0.4.5, 0.4.6