blob: 89daed13f8f853d9f84ee347dc7b0abde19890ee [file] [log] [blame]
{
"id": "GO-2023-1623",
"published": "0001-01-01T00:00:00Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-27483"
],
"details": "An out of memory panic vulnerability exists in the crossplane-runtime libraries.\n\nApplications that use the Paved type's SetValue method with user-provided input that is not properly validated might use excessive amounts of memory and cause an out of memory panic.\n\nIn the fieldpath package, the Paved.SetValue method sets a value on the Paved object according to the provided path, without any validation. This allows setting values in slices at any provided index, which grows the target array up to the requested index. The index is currently capped at max uint32 (4294967295), a large value. If callers do not validate paths' indexes on their own, this could allow users to consume arbitrary amounts of memory.\n\nApplications that do not use the Paved type's SetValue method are not affected.\n\nUsers unable to upgrade can work around this issue by parsing and validating the path before passing it to the SetValue method of the Paved type, constraining the index size as deemed appropriate.",
"affected": [
{
"package": {
"name": "github.com/crossplane/crossplane-runtime",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.6.0"
},
{
"fixed": "0.16.1"
},
{
"introduced": "0.17.0"
},
{
"fixed": "0.19.2"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1623"
},
"ecosystem_specific": {
"imports": [
{
"path": "github.com/crossplane/crossplane-runtime/pkg/fieldpath",
"symbols": [
"Paved.MergeValue",
"Paved.SetBool",
"Paved.SetNumber",
"Paved.SetString",
"Paved.SetValue"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/crossplane/crossplane-runtime/security/advisories/GHSA-vfvj-3m3g-m532"
},
{
"type": "FIX",
"url": "https://github.com/crossplane/crossplane-runtime/commit/53508a9f4374604db140dd8ab2fa52276441e738"
}
],
"credits": [
{
"name": "Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF."
}
],
"schema_version": "1.3.1"
}