Skip to content

Commit

Permalink
data/reports: add GO-2023-2024.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2023-40583, GHSA-gcq9-qqwx-rgj3

Fixes #2024

Change-Id: Ia18e7b13ca46b9f03ecb849978377486285d510e
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/527577
Reviewed-by: Damien Neil <[email protected]>
Run-TryBot: Tim King <[email protected]>
LUCI-TryBot-Result: Go LUCI <[email protected]>
TryBot-Result: Gopher Robot <[email protected]>
  • Loading branch information
timothy-king committed Sep 13, 2023
1 parent b25afe1 commit 1328bab
Show file tree
Hide file tree
Showing 2 changed files with 103 additions and 0 deletions.
70 changes: 70 additions & 0 deletions data/osv/GO-2023-2024.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,70 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-2024",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-40583",
"GHSA-gcq9-qqwx-rgj3"
],
"summary": "libp2p nodes vulnerable to OOM attack",
"details": "A malicious actor can store an arbitrary amount of data in the memory of a remote node by sending the node a message with a signed peer record. Signed peer records from randomly generated peers can be sent by a malicious actor. This memory does not get garbage collected and so the remote node can run out of memory (OOM).",
"affected": [
{
"package": {
"name": "github.com/libp2p/go-libp2p",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.27.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/libp2p/go-libp2p/core/record",
"symbols": [
"ConsumeEnvelope"
]
},
{
"path": "github.com/libp2p/go-libp2p/p2p/protocol/identify",
"symbols": [
"idService.IdentifyConn",
"idService.IdentifyWait",
"idService.consumeMessage",
"netNotifiee.Connected"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/libp2p/go-libp2p/security/advisories/GHSA-gcq9-qqwx-rgj3"
},
{
"type": "FIX",
"url": "https://github.com/libp2p/go-libp2p/commit/45d3c6fff662ddd6938982e7e9309ad5fa2ad8dd"
}
],
"credits": [
{
"name": "Marten Seemann"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2024"
}
}
33 changes: 33 additions & 0 deletions data/reports/GO-2023-2024.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
id: GO-2023-2024
modules:
- module: github.com/libp2p/go-libp2p
versions:
- fixed: 0.27.4
vulnerable_at: 0.27.3
packages:
- package: github.com/libp2p/go-libp2p/core/record
symbols:
- ConsumeEnvelope
- package: github.com/libp2p/go-libp2p/p2p/protocol/identify
symbols:
- idService.consumeMessage
derived_symbols:
- idService.IdentifyConn
- idService.IdentifyWait
- netNotifiee.Connected
summary: libp2p nodes vulnerable to OOM attack
description: |-
A malicious actor can store an arbitrary amount of data in the memory of a
remote node by sending the node a message with a signed peer record. Signed peer
records from randomly generated peers can be sent by a malicious actor. This
memory does not get garbage collected and so the remote node can run out of
memory (OOM).
cves:
- CVE-2023-40583
ghsas:
- GHSA-gcq9-qqwx-rgj3
credits:
- Marten Seemann
references:
- advisory: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-gcq9-qqwx-rgj3
- fix: https://github.com/libp2p/go-libp2p/commit/45d3c6fff662ddd6938982e7e9309ad5fa2ad8dd

0 comments on commit 1328bab

Please sign in to comment.