Skip to content

Commit

Permalink
data/reports: add GO-2023-2000.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2023-39533

Fixes #2000

Change-Id: Id44de51bb6faedfa74efbf2cd6637bc79fa8f03d
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/517435
Run-TryBot: Zvonimir Pavlinovic <zpavlinovic@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
  • Loading branch information
zpavlinovic committed Aug 8, 2023
1 parent 9021c1d commit 1c6618f
Show file tree
Hide file tree
Showing 2 changed files with 106 additions and 0 deletions.
75 changes: 75 additions & 0 deletions data/osv/GO-2023-2000.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,75 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-2000",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-39533"
],
"summary": "Large RSA keys can cause high resource usage in core/crypto package",
"details": "Extremely large RSA keys can cause a client/server to spend significant CPU time verifying signatures leading to resource exhaustion attacks.\n\nWith fix, the size of RSA keys transmitted during handshakes is restricted to \u003c= 8192 bits.",
"affected": [
{
"package": {
"name": "github.com/libp2p/go-libp2p",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.27.8"
},
{
"introduced": "0.28.0"
},
{
"fixed": "0.28.2"
},
{
"introduced": "0.29.0"
},
{
"fixed": "0.29.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/libp2p/go-libp2p/core/crypto",
"symbols": [
"GenerateKeyPair",
"GenerateKeyPairWithReader",
"GenerateRSAKeyPair",
"UnmarshalRsaPrivateKey",
"UnmarshalRsaPublicKey"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/libp2p/go-libp2p/security/advisories/GHSA-876p-8259-xjgg"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/61460"
},
{
"type": "FIX",
"url": "https://github.com/libp2p/go-libp2p/commit/0cce607219f3710addc7e18672cffd1f1d912fbb"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2000"
}
}
31 changes: 31 additions & 0 deletions data/reports/GO-2023-2000.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
id: GO-2023-2000
modules:
- module: github.com/libp2p/go-libp2p
versions:
- fixed: 0.27.8
- introduced: 0.28.0
fixed: 0.28.2
- introduced: 0.29.0
fixed: 0.29.1
vulnerable_at: 0.29.0
packages:
- package: github.com/libp2p/go-libp2p/core/crypto
symbols:
- GenerateRSAKeyPair
- UnmarshalRsaPrivateKey
- UnmarshalRsaPublicKey
derived_symbols:
- GenerateKeyPair
- GenerateKeyPairWithReader
summary: Large RSA keys can cause high resource usage in core/crypto package
description: |-
Large RSA keys can lead to resource exhaustion attacks.
With fix, the size of RSA keys transmitted during handshakes is
restricted to <= 8192 bits.
cves:
- CVE-2023-39533
references:
- advisory: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-876p-8259-xjgg
- report: https://go.dev/issue/61460
- fix: https://github.com/libp2p/go-libp2p/commit/0cce607219f3710addc7e18672cffd1f1d912fbb

0 comments on commit 1c6618f

Please sign in to comment.