go-bitfield is a simple bitfield package for the go language aiming to be more performant that the standard library. When feeding untrusted user input into the size parameter of `NewBitfield` and `FromBytes` functions, an attacker can trigger `panic`s. This happen when the `size` is a not a multiple of `8` or is negative. There were already a note in the `NewBitfield` documentation, however known users of this package are subject to this issue. Users are advised to upgrade. Users unable to upgrade should ensure that `size` is a multiple of 8 before calling `NewBitfield` or `FromBytes`.
References
Link | Resource |
---|---|
https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579 | Patch |
https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r | Exploit Patch Vendor Advisory |
Configurations
Information
Published : 2023-02-09 13:15
Updated : 2023-02-17 09:37
NVD link : CVE-2023-23626
Mitre link : CVE-2023-23626
JSON object : View
CWE
CWE-1284
Improper Validation of Specified Quantity in Input
Products Affected
protocol
- go-bitfield