If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus fanout parameter in the HAMT directory nodes. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0622 | github.com/ipfs/go-unixfsnode is an ADL IPLD prime node that wraps go-codec-dagpb's implementation of protobuf to enable pathing. In versions priot to 1.5.2 trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus fanout parameter in the HAMT directory nodes. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-4gj3-6r43-3wfc | IPFS go-unixfsnode subject to DOS via HAMT Decoding Panics |
Mon, 10 Mar 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-10T21:14:10.912Z
Reserved: 2023-01-16T17:07:46.245Z
Link: CVE-2023-23631
Updated: 2024-08-02T10:35:33.625Z
Status : Modified
Published: 2023-02-09T21:15:11.513
Modified: 2024-11-21T07:46:34.457
Link: CVE-2023-23631
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA