Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0601 | go-bitfield is a simple bitfield package for the go language aiming to be more performant that the standard library. When feeding untrusted user input into the size parameter of `NewBitfield` and `FromBytes` functions, an attacker can trigger `panic`s. This happen when the `size` is a not a multiple of `8` or is negative. There were already a note in the `NewBitfield` documentation, however known users of this package are subject to this issue. Users are advised to upgrade. Users unable to upgrade should ensure that `size` is a multiple of 8 before calling `NewBitfield` or `FromBytes`. |
Github GHSA |
GHSA-2h6c-j3gf-xp9r | IPFS go-bitfield vulnerable to DoS via malformed size arguments |
Mon, 10 Mar 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-10T21:14:05.485Z
Reserved: 2023-01-16T17:07:46.244Z
Link: CVE-2023-23626
Updated: 2024-08-02T10:35:33.661Z
Status : Modified
Published: 2023-02-09T21:15:11.413
Modified: 2024-11-21T07:46:33.840
Link: CVE-2023-23626
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA