CVE-2023-25568: Allocation of Resources Without Limits or Throttling
Boxo, formerly known as go-libipfs, is a library for building IPFS applications and implementations. In versions 0.4.0 and 0.5.0, if an attacker is able allocate arbitrary many bytes in the Bitswap server, those allocations are lasting even if the connection is closed. This affects users accepting untrusted connections with the Bitswap server and also affects users using the old API stubs at github.com/ipfs/go-libipfs/bitswap
because users then transitively import github.com/ipfs/go-libipfs/bitswap/server
. Boxo versions 0.6.0 and 0.4.1 contain a patch for this issue. As a workaround, those who are using the stub object at github.com/ipfs/go-libipfs/bitswap
not taking advantage of the features provided by the server can refactor their code to use the new split API that will allow them to run in a client only mode: github.com/ipfs/go-libipfs/bitswap/client
.
References
- github.com/advisories/GHSA-m974-xj4j-7qv5
- github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916
- github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197
- github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974
- github.com/ipfs/boxo/security/advisories/GHSA-m974-xj4j-7qv5
- github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5
- nvd.nist.gov/vuln/detail/CVE-2023-25568
Detect and mitigate CVE-2023-25568 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →