Skip to content

Commit

Permalink
data/reports: run fix on GO-2022-1148.yaml
Browse files Browse the repository at this point in the history
This required running fix with an older version of Go because
some dependencies only work with <1.19.

Aliases: CVE-2022-23492, GHSA-j7qp-mfxf-8xjw

Updates #1148

Change-Id: I5d3ada1b59f57f3f72157a367ff69028540ec05b
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/465815
Run-TryBot: Tatiana Bradley <[email protected]>
Reviewed-by: Tim King <[email protected]>
TryBot-Result: Gopher Robot <[email protected]>
  • Loading branch information
tatianab committed Feb 7, 2023
1 parent d7fb56a commit 0c997e2
Show file tree
Hide file tree
Showing 2 changed files with 27 additions and 13 deletions.
9 changes: 7 additions & 2 deletions data/osv/GO-2022-1148.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"CVE-2022-23492",
"GHSA-j7qp-mfxf-8xjw"
],
"details": "go-libp2p is vulnerable to targeted resource exhaustion attacks. These attacks target libp2p's connection,stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host's operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.\n\nIt's recommend that you update to v0.21.0 onwards as you'll get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits.",
"details": "go-libp2p is vulnerable to targeted resource exhaustion attacks.\n\nThese attacks target libp2p's connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory ultimately leading to the process getting killed by the host's operating system.\n\nWhile a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.\n\nIt's recommend to update to v0.21.0 onwards to get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits.",
"affected": [
{
"package": {
Expand Down Expand Up @@ -34,7 +34,12 @@
{
"path": "github.com/libp2p/go-libp2p",
"symbols": [
"New"
"DefaultStaticRelays",
"Muxer",
"New",
"NewWithoutDefaults",
"Security",
"Transport"
]
},
{
Expand Down
31 changes: 20 additions & 11 deletions data/reports/GO-2022-1148.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,12 @@ modules:
- package: github.com/libp2p/go-libp2p
symbols:
- New
derived_symbols:
- DefaultStaticRelays
- Muxer
- NewWithoutDefaults
- Security
- Transport
- package: github.com/libp2p/go-libp2p/config
symbols:
- MuxerConstructor
Expand Down Expand Up @@ -52,18 +58,21 @@ modules:
- Service.DirectConnect
- netNotifiee.Connected
description: |
go-libp2p is vulnerable to targeted resource exhaustion attacks. These
attacks target libp2p's connection,stream, peer, and memory management. An
attacker can cause the allocation of large amounts of memory, ultimately
leading to the process getting killed by the host's operating system. While
a connection manager tasked with keeping the number of connections within
manageable limits has been part of go-libp2p, this component was designed
to handle the regular churn of peers, not a targeted resource exhaustion
attack.
go-libp2p is vulnerable to targeted resource exhaustion attacks.
These attacks target libp2p's connection, stream, peer, and memory
management. An attacker can cause the allocation of large amounts of memory
ultimately leading to the process getting killed by the host's operating
system.
While a connection manager tasked with keeping the number of connections
within manageable limits has been part of go-libp2p, this component was
designed to handle the regular churn of peers, not a targeted resource
exhaustion attack.
It's recommend that you update to v0.21.0 onwards as you'll get some useful
functionality that will help in production environments like better metrics
around resource usage, Grafana dashboards around resource usage, allow list
It's recommend to update to v0.21.0 onwards to get some useful functionality
that will help in production environments like better metrics around
resource usage, Grafana dashboards around resource usage, allow list
support, and default autoscaling limits.
cves:
- CVE-2022-23492
Expand Down

0 comments on commit 0c997e2

Please sign in to comment.