CVE-2022-36023 – github.com/hyperledger/fabric
Package
Manager: go
Name: github.com/hyperledger/fabric
Vulnerable Version: >=2.4.0 <2.4.6
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00498 pctl0.64873
Details
Remote denial of service in Hyperledger Fabric Gateway ### Impact If a gateway client application sends a malformed request to a gateway peer it may crash the peer node. This fix checks for the malformed gateway request and returns an error to the gateway client. ### Patches Fixed in v2.4.6. ### Workarounds None, users must upgrade to v2.4.6. ### References https://github.com/hyperledger/fabric/releases/tag/v2.4.6 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Fabric](https://github.com/hyperledger/fabric) ### Credits Thank you to Haosheng Wang of OPPO ZIWU Security Lab for this disclosure.
Metadata
Created: 2022-10-13T19:12:05Z
Modified: 2022-10-13T19:12:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-qj6r-fhrc-jj5r/GHSA-qj6r-fhrc-jj5r.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-qj6r-fhrc-jj5r
Finding: F184
Auto approve: 1