First published: Tue Aug 08 2023(Updated: )
### Impact A malicious peer can use large RSA keys to run a resource exhaustion attack & force a node to spend time doing signature verification of the large key. This vulnerability is present in the core/crypto module of go-libp2p and can occur during the Noise handshake and the libp2p x509 extension verification step. To prevent this attack, go-libp2p now restricts RSA keys to <= 8192 bits. ### Patches Users should upgrade their go-libp2p versions to >=v0.27.8, >= v0.28.2, or >=v0.29.1 To protect your application, it's necessary to update to these patch releases **AND** to use the updated Go compiler (1.20.7 or 1.19.12, respectively) ### Workarounds There are no known workarounds ### References The Golang crypto/tls package also had this vulnerability ("verifying certificate chains containing large RSA keys is slow” https://github.com/golang/go/issues/61460) Fix in golang/go crypto/tls: https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017 Fix in quic-go https://github.com/quic-go/quic-go/pull/4012
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.19.12 | |
Golang Go | >=1.20.0<1.20.7 | |
Libp2p Go-libp2p | <0.27.8 | |
Libp2p Go-libp2p | >=0.28.0<0.28.2 | |
Libp2p Go-libp2p | =0.29.0 | |
Quic Project Quic | <0.37.2 | |
IBM Planning Analytics on Cloud Pak for Data | <=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39533 is a vulnerability in the go-libp2p Networking Stack that allows a malicious peer to launch a resource exhaustion attack.
The impact of CVE-2023-39533 is that it can force a node to spend time doing signature verification of large RSA keys, leading to resource exhaustion.
The affected software versions of CVE-2023-39533 are go-libp2p versions 0.27.8, 0.28.0 to 0.28.2, and 0.29.0.
To fix CVE-2023-39533, update your go-libp2p package to version 0.29.1 or higher.
You can find more information about CVE-2023-39533 in the references provided: [GitHub Commit #1](https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017), [GitHub Issue](https://github.com/golang/go/issues/61460), [GitHub Commit #2](https://github.com/libp2p/go-libp2p/commit/0cce607219f3710addc7e18672cffd1f1d912fbb).