Skip to content

Commit b2bd8da

Browse files
committed
data/reports: add GO-2023-1883.yaml
Aliases: CVE-2023-34451, GHSA-w24w-wp77-qffm Fixes #1883 Change-Id: I2d1dd45aaeee09f1128ce1cc8ef9c3dde50d2fdc Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/508455 Run-TryBot: Jonathan Amsterdam <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Tatiana Bradley <[email protected]>
1 parent 13c00d3 commit b2bd8da

File tree

2 files changed

+92
-0
lines changed

2 files changed

+92
-0
lines changed

data/osv/GO-2023-1883.json

Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2023-1883",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2023-34451",
8+
"GHSA-w24w-wp77-qffm"
9+
],
10+
"summary": "Denial of service via OOM in github.com/cometbft/cometbft",
11+
"details": "A bug in the CometBFT middleware causes the mempool's two data structures to fall out of sync. This can lead to duplicate transactions that cannot be removed, even after they are committed in a block. The only way to remove the transaction is to restart the node. This can be exploited by an attacker to bring down a node by repeatedly submitting duplicate transactions.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/cometbft/cometbft",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "0.37.2"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/cometbft/cometbft/mempool/v0",
35+
"symbols": [
36+
"CListMempool.CheckTx",
37+
"CListMempool.resCbFirstTime",
38+
"Reactor.ReceiveEnvelope"
39+
]
40+
}
41+
]
42+
}
43+
}
44+
],
45+
"references": [
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://github.com/cometbft/cometbft/security/advisories/GHSA-w24w-wp77-qffm"
49+
},
50+
{
51+
"type": "FIX",
52+
"url": "https://github.com/cometbft/cometbft/pull/890"
53+
},
54+
{
55+
"type": "FIX",
56+
"url": "https://github.com/tendermint/tendermint/pull/2778"
57+
}
58+
],
59+
"database_specific": {
60+
"url": "https://pkg.go.dev/vuln/GO-2023-1883"
61+
}
62+
}

data/reports/GO-2023-1883.yaml

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
id: GO-2023-1883
2+
modules:
3+
- module: github.com/cometbft/cometbft
4+
versions:
5+
- fixed: 0.37.2
6+
vulnerable_at: 0.37.1
7+
packages:
8+
- package: github.com/cometbft/cometbft/mempool/v0
9+
symbols:
10+
- CListMempool.resCbFirstTime
11+
derived_symbols:
12+
- CListMempool.CheckTx
13+
- Reactor.ReceiveEnvelope
14+
summary: Denial of service via OOM in github.com/cometbft/cometbft
15+
description: |-
16+
A bug in the CometBFT middleware causes the mempool's two data structures to
17+
fall out of sync. This can lead to duplicate transactions that cannot be
18+
removed, even after they are committed in a block. The only way to remove
19+
the transaction is to restart the node. This can be exploited by an attacker
20+
to bring down a node by repeatedly submitting duplicate transactions.
21+
cves:
22+
- CVE-2023-34451
23+
ghsas:
24+
- GHSA-w24w-wp77-qffm
25+
references:
26+
- advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-w24w-wp77-qffm
27+
- fix: https://github.com/cometbft/cometbft/pull/890
28+
- fix: https://github.com/tendermint/tendermint/pull/2778
29+
notes:
30+
- The advisory refers to versions beginning 0.34. The module at those versions requires a replace directive to be usable. There is a fix in 0.34.28.

0 commit comments

Comments
 (0)