{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T20:57:29.329","vulnerabilities":[{"cve":{"id":"CVE-2022-23495","sourceIdentifier":"security-advisories@github.com","published":"2022-12-08T22:15:10.233","lastModified":"2024-11-21T06:48:40.890","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"go-merkledag implements the 'DAGService' interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input.\n"},{"lang":"es","value":"go-merkledag implementa la interfaz 'DAGService' y agrega dos tipos de nodos ipld, Protobuf y Raw para el proyecto ipfs. Un `ProtoNode` puede modificarse de tal manera que cause varios errores de codificación que provocarán pánico en llamadas a métodos comunes que no permiten devoluciones de errores. Un `ProtoNode` solo debería poder codificar en DAG-PB válido; intentar codificar formularios DAG-PB no válidos generará un error en el códec. La manipulación de un \"ProtoNodo\" existente (recién creado o decodificado) utilizando los métodos modificadores no tuvo en cuenta ciertos estados que colocarían el \"ProtoNodo\" en una forma no codificable. Debido a la conformidad con [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) y [` github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, ciertos métodos, que internamente requieren una re-encode si el estado ha cambiado, entrará en pánico debido a la imposibilidad de devolver un error. Este problema se ha solucionado en varias solicitudes de extracción. Se recomienda a los usuarios que actualicen a la versión 0.8.1 para obtener un conjunto completo de correcciones. Los usuarios que no puedan actualizar pueden intentar mitigar este problema desinfectando las entradas cuando permiten que las entradas del usuario establezcan un nuevo `CidBuilder` en un `ProtoNode` y sanitizando los valores de `Tsize` (`Link#Size`) de modo que sean razonables. El tamaño de bytes para sub-DAG se deriva de la entrada del usuario."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-755"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-252"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:protocol:go-merkledag:*:*:*:*:*:*:*:*","versionStartIncluding":"0.4.0","versionEndExcluding":"0.8.1","matchCriteriaId":"02537CFA-1940-4266-BAB5-D06516862DA8"}]}]}],"references":[{"url":"https://en.wikipedia.org/wiki/Directed_acyclic_graph","source":"security-advisories@github.com","tags":["Technical Description","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/issues/90","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/pull/91","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/pull/92","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/pull/93","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0","source":"security-advisories@github.com","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1","source":"security-advisories@github.com","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/ipfs/kubo/issues/9297","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://en.wikipedia.org/wiki/Directed_acyclic_graph","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Technical Description","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/issues/90","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/pull/91","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/pull/92","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/pull/93","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/releases/tag/v0.8.1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Third Party Advisory"]},{"url":"https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://github.com/ipfs/kubo/issues/9297","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}