First published: Thu Feb 09 2023(Updated: )
### Impact Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus `fanout` parameter in the HAMT directory nodes. This include checks returned in [ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r](https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r), as well as limiting the `fanout` to `<= 1024` (to avoid attempts of arbitrary sized allocations). ### Patches - https://github.com/ipfs/go-unixfs/commit/dbcc43ec3e2db0d01e8d80c55040bba3cf22cb4b ### Workarounds Do not feed untrusted user data to the decoding functions. ### References - https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Protocol Go-unixfs | <0.4.3 | |
go/github.com/ipfs/go-unixfs | <0.4.3 | 0.4.3 |
<0.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23625 is a vulnerability in the go-unixfs library that can be exploited by reading malformed HAMT sharded directories, leading to panics and virtual memory leaks.
CVE-2023-23625 has a severity rating of high with a CVSS score of 7.5.
CVE-2023-23625 affects go-unixfs versions up to and excluding version 0.4.3.
No, the vulnerability requires reading malformed HAMT sharded directories, which means it can only be exploited by a local attacker.
To mitigate CVE-2023-23625, update go-unixfs to a version that is equal to or higher than 0.4.3.