{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T22:29:40.420","vulnerabilities":[{"cve":{"id":"CVE-2023-23631","sourceIdentifier":"security-advisories@github.com","published":"2023-02-09T21:15:11.513","lastModified":"2024-11-21T07:46:34.457","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"github.com/ipfs/go-unixfsnode is an ADL IPLD prime node that wraps go-codec-dagpb's implementation of protobuf to enable pathing. In versions priot to 1.5.2 trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.\nIf you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus fanout parameter in the HAMT directory nodes. Users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"github.com/ipfs/go-unixfsnode es un nodo principal de ADL IPLD que envuelve la implementación de protobuf de go-codec-dagpb para habilitar la ruta. En versiones anteriores a la 1.5.2, intentar leer directorios fragmentados con HAMT con formato incorrecto puede provocar pánico y pérdidas de memoria virtual. Si está leyendo entradas de usuarios que no son de confianza, un atacante puede provocar pánico. Esto se debe a un parámetro de distribución falso en los nodos del directorio HAMT. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:protocol:go-unixfsnode:*:*:*:*:*:go:*:*","versionEndExcluding":"1.5.2","matchCriteriaId":"85F78CD5-2FE1-411D-B9B4-6FBD3D7CC2F6"}]}]}],"references":[{"url":"https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}