CVE-2023-25568

Boxo, formerly known as go-libipfs, is a library for building IPFS applications and implementations. In versions 0.4.0 and 0.5.0, if an attacker is able allocate arbitrary many bytes in the Bitswap server, those allocations are lasting even if the connection is closed. This affects users accepting untrusted connections with the Bitswap server and also affects users using the old API stubs at `github.com/ipfs/go-libipfs/bitswap` because users then transitively import `github.com/ipfs/go-libipfs/bitswap/server`. Boxo versions 0.6.0 and 0.4.1 contain a patch for this issue. As a workaround, those who are using the stub object at `github.com/ipfs/go-libipfs/bitswap` not taking advantage of the features provided by the server can refactor their code to use the new split API that will allow them to run in a client only mode: `github.com/ipfs/go-libipfs/bitswap/client`.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:protocol:boxo:0.4.0:*:*:*:*:go:*:*
cpe:2.3:a:protocol:boxo:0.5.0:*:*:*:*:go:*:*

History

19 May 2023, 01:53

Type Values Removed Values Added
References (MISC) https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197 - (MISC) https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197 - Patch
References (MISC) https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974 - (MISC) https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974 - Patch
References (MISC) https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916 - (MISC) https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916 - Patch
References (CONFIRM) https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5 - (CONFIRM) https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5 - Mitigation, Patch, Vendor Advisory
CPE cpe:2.3:a:protocol:boxo:0.4.0:*:*:*:*:go:*:*
cpe:2.3:a:protocol:boxo:0.5.0:*:*:*:*:go:*:*
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

10 May 2023, 14:38

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-10 14:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-25568

Mitre link : CVE-2023-25568

CVE.ORG link : CVE-2023-25568


JSON object : View

Products Affected

protocol

  • boxo
CWE
CWE-770

Allocation of Resources Without Limits or Throttling

CWE-400

Uncontrolled Resource Consumption