7.5
CWE
770
Advisory Published
Advisory Published
Updated

CVE-2023-39533

First published: Tue Aug 08 2023(Updated: )

go-libp2p is the Go implementation of the libp2p Networking Stack. Prior to versions 0.27.8, 0.28.2, and 0.29.1 malicious peer can use large RSA keys to run a resource exhaustion attack & force a node to spend time doing signature verification of the large key. This vulnerability is present in the core/crypto module of go-libp2p and can occur during the Noise handshake and the libp2p x509 extension verification step. To prevent this attack, go-libp2p versions 0.27.8, 0.28.2, and 0.29.1 restrict RSA keys to <= 8192 bits. To protect one's application, it is necessary to update to these patch releases and to use the updated Go compiler in 1.20.7 or 1.19.12. There are no known workarounds for this issue.

Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Golang Go<1.19.12
Golang Go>=1.20.0<1.20.7
Libp2p Go-libp2p<0.27.8
Libp2p Go-libp2p>=0.28.0<0.28.2
Libp2p Go-libp2p=0.29.0
Quic Project Quic<0.37.2
IBM Planning Analytics on Cloud Pak for Data<=4.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2023-39533?

    CVE-2023-39533 is a vulnerability in the go-libp2p Networking Stack that allows a malicious peer to launch a resource exhaustion attack.

  • What is the impact of CVE-2023-39533?

    The impact of CVE-2023-39533 is that it can force a node to spend time doing signature verification of large RSA keys, leading to resource exhaustion.

  • Which software versions are affected by CVE-2023-39533?

    The affected software versions of CVE-2023-39533 are go-libp2p versions 0.27.8, 0.28.0 to 0.28.2, and 0.29.0.

  • How can I fix CVE-2023-39533?

    To fix CVE-2023-39533, update your go-libp2p package to version 0.29.1 or higher.

  • Where can I find more information about CVE-2023-39533?

    You can find more information about CVE-2023-39533 in the references provided: [GitHub Commit #1](https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017), [GitHub Issue](https://github.com/golang/go/issues/61460), [GitHub Commit #2](https://github.com/libp2p/go-libp2p/commit/0cce607219f3710addc7e18672cffd1f1d912fbb).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203