blob: 146d7d9519355cbf949c000f3218dcd258c028ef [file] [log] [blame]
Tatiana Bradleyf1409b02023-05-24 14:02:12 -04001id: GO-2023-1558
Maceo Thompson81e94ec2023-02-14 12:25:44 -05002modules:
Tatiana Bradley82175fd2023-05-31 17:04:08 -04003 - module: github.com/ipfs/go-bitfield
4 versions:
5 - fixed: 1.1.0
6 vulnerable_at: 1.0.0
7 packages:
8 - package: github.com/ipfs/go-bitfield
9 symbols:
10 - NewBitfield
11 - FromBytes
Tatiana Bradley7c92a882023-05-08 13:11:54 -040012summary: 'TODO(https://go.dev/issue/56443): fill in summary field'
Maceo Thompson81e94ec2023-02-14 12:25:44 -050013description: |
14 When feeding untrusted user input into the size parameter of `NewBitfield`
15 and FromBytes functions, an attacker can trigger panics.
16
17 This happens when the size is a not a multiple of 8 or is negative.
18
19 A workaround is to ensure size%8 == 0 && size >= 0 yourself before calling
20 NewBitfield or FromBytes.
21cves:
Tatiana Bradley82175fd2023-05-31 17:04:08 -040022 - CVE-2023-23626
Maceo Thompson81e94ec2023-02-14 12:25:44 -050023ghsas:
Tatiana Bradley82175fd2023-05-31 17:04:08 -040024 - GHSA-2h6c-j3gf-xp9r
Tatiana Bradley09108142023-05-18 16:23:32 -040025credits:
Tatiana Bradley82175fd2023-05-31 17:04:08 -040026 - Jorropo
Maceo Thompson81e94ec2023-02-14 12:25:44 -050027references:
Tatiana Bradley82175fd2023-05-31 17:04:08 -040028 - advisory: https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r
29 - fix: https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579