GHSA-H3M7-RQC4-7H9P
Vulnerability from github – Published: 2024-03-01 23:32 – Updated: 2024-03-01 23:32
VLAI?
Summary
Integer overflow in chunking helper causes dispatching to miss elements or panic
Details
Any SpiceDB cluster with any schema where a resource being checked has more than 65535 relationships for the same resource and subject type is affected by this problem.
The issue may also lead to a panic rendering the server unavailable
The following API methods are affected: - CheckPermission - BulkCheckPermission - LookupSubjects
Impact
Permission checks that are expected to be allowed are instead denied, and lookup subjects will return fewer subjects than expected.
Workarounds
There is no workaround other than making sure that the SpiceDB cluster does not have very wide relations, with the maximum value being the maximum value of an 16-bit unsigned integer
Remediations
- AuthZed Dedicated customers: No action. AuthZed has upgraded all deployments.
- AuthZed Serverless customers: No Action. AuthZed has upgraded all deployments.
- AuthZed Enterprise customers: Upgrade to v1.29.2-hotfix-enterprise.v1.hotfix.v1
- Open Source users: Upgrade to v1.29.2
Severity ?
7.3 (High)
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/authzed/spicedb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.29.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-27101"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": true,
"github_reviewed_at": "2024-03-01T23:32:10Z",
"nvd_published_at": "2024-03-01T21:15:08Z",
"severity": "HIGH"
},
"details": "Any SpiceDB cluster with any schema where a resource being checked has more than 65535 relationships for the same resource and subject type is affected by this problem.\n\nThe issue may also lead to a panic rendering the server unavailable\n\nThe following API methods are affected:\n- [CheckPermission](https://buf.build/authzed/api/docs/main:authzed.api.v1#authzed.api.v1.PermissionsService.CheckPermission)\n- [BulkCheckPermission](https://buf.build/authzed/api/docs/main:authzed.api.v1#authzed.api.v1.ExperimentalService.BulkCheckPermission)\n- [LookupSubjects](https://buf.build/authzed/api/docs/main:authzed.api.v1#authzed.api.v1.PermissionsService.LookupSubjects)\n\n#### Impact\n\nPermission checks that are expected to be allowed are instead denied, and lookup subjects will return fewer subjects than expected.\n\n#### Workarounds\n\nThere is no workaround other than making sure that the SpiceDB cluster does not have very wide relations, with the maximum value being the maximum value of an 16-bit unsigned integer\n\n#### Remediations\n\n- AuthZed Dedicated customers: No action. AuthZed has upgraded all deployments.\n- AuthZed Serverless customers: No Action. AuthZed has upgraded all deployments.\n- AuthZed Enterprise customers: Upgrade to [v1.29.2-hotfix-enterprise.v1.hotfix.v1](https://github.com/authzed-enterprise/src/pkgs/container/spicedb-enterprise/182719614?tag=v1.29.2-hotfix-enterprise.v1.hotfix.v1)\n - Open Source users: Upgrade to v1.29.2",
"id": "GHSA-h3m7-rqc4-7h9p",
"modified": "2024-03-01T23:32:10Z",
"published": "2024-03-01T23:32:10Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/authzed/spicedb/security/advisories/GHSA-h3m7-rqc4-7h9p"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27101"
},
{
"type": "WEB",
"url": "https://github.com/authzed/spicedb/commit/ef443c442b96909694390324a99849b0407007fe"
},
{
"type": "PACKAGE",
"url": "https://github.com/authzed/spicedb"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Integer overflow in chunking helper causes dispatching to miss elements or panic"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…