CVE-2023-23626:
IPFS go-bitfield vulnerable to DoS via malformed size arguments
5.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.40083%
CWE
Published
2/10/2023
Updated
6/13/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/ipfs/go-bitfield | go | < 1.1.0 | 1.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- Advisory explicitly names NewBitfield and FromBytes as vulnerable entry points
- Commit diff shows both functions lacked proper size validation:
- NewBitfield panicked on bad size
- FromBytes called NewBitfield without error handling
- FromBytes had separate panic for size mismatch
- CWE-1284 (input validation) and CWE-754 (exceptional condition checks) map directly to:
- Missing validation for size%8==0 and size>=0
- Reliance on panics instead of error handling
- Patch converted both functions to return errors instead of panicking
- Tests added for negative sizes and non-multiples of 8
- Workaround instructions specifically reference these two functions