Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic.
This is caused by bogus fanout
parameter in the HAMT directory nodes.
This include checks returned in ipfs/go-bitfield GHSA-2h6c-j3gf-xp9r, as well as limiting the fanout
to <= 1024
(to avoid attempts of arbitrary sized allocations).
Do not feed untrusted user data to the decoding functions.
{ "nvd_published_at": "2023-02-09T21:15:00Z", "cwe_ids": [ "CWE-400" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-02-10T23:08:06Z" }