CVE-2022-36023 – Remote denial of service in Hyperledger Fabric Gateway
https://notcve.org/view.php?id=CVE-2022-36023
Hyperledger Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications. If a gateway client application sends a malformed request to a gateway peer it may crash the peer node. Version 2.4.6 checks for the malformed gateway request and returns an error to the gateway client. There are no known workarounds, users must upgrade to version 2.4.6. Hyperledger Fabric es un marco de libro mayor distribuido de grado empresarial para desarrollar soluciones y aplicaciones. • https://github.com/hyperledger/fabric/pull/3572 https://github.com/hyperledger/fabric/pull/3576 https://github.com/hyperledger/fabric/pull/3577 https://github.com/hyperledger/fabric/releases/tag/v2.4.6 https://github.com/hyperledger/fabric/security/advisories/GHSA-qj6r-fhrc-jj5r • CWE-20: Improper Input Validation •
CVE-2022-31121 – Improper Input Validation in fabric hyperledger
https://notcve.org/view.php?id=CVE-2022-31121
Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this issue. • https://github.com/hyperledger/fabric/commit/0f18359493bcbd5f9f9d1a9b05adabfe5da23b06 https://github.com/hyperledger/fabric/releases/tag/v2.2.7 https://github.com/hyperledger/fabric/releases/tag/v2.4.5 https://github.com/hyperledger/fabric/security/advisories/GHSA-72x4-cq6r-jp4p • CWE-20: Improper Input Validation •
CVE-2011-2185
https://notcve.org/view.php?id=CVE-2011-2185
Fabric before 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on (1) a /tmp/fab.*.tar file or (2) certain other files in the top level of /tmp/. Fabric anteriores a v1.1.0 permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simbólicos en (1) un fichero /tmp/fab.*. o (2) algunos ficheros en el nivel superior de /tmp/. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629003 http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062534.html http://www.openwall.com/lists/oss-security/2011/06/03/5 http://www.openwall.com/lists/oss-security/2011/06/06/12 https://bugzilla.redhat.com/show_bug.cgi?id=710462 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •