CVE-2026-35480: Unbounded Memory Allocation and Denial of Service in go-ipld-prime DAG-CBOR Decoder
Vulnerability ID: CVE-2026-35480
CVSS Score: 6.2
Published: 2026-04-06
The go-ipld-prime library prior to version 0.22.0 suffers from a resource exhaustion vulnerability in its DAG-CBOR decoding implementation. Maliciously crafted CBOR payloads containing artificially large declared collection sizes bypass early budget checks, triggering massive upfront memory allocations that result in immediate application crashes.
TL;DR
A flaw in the go-ipld-prime DAG-CBOR decoder allows attackers to trigger Out-of-Memory (OOM) crashes via small payloads with large declared map or list lengths. The vulnerability is fixed in version 0.22.0.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-770
- Attack Vector: Local / Network
- CVSS Score: 6.2
- Exploit Status: Proof of Concept (Unit Tests)
- CISA KEV: Not Listed
- Impact: High Availability Impact (DoS)
Affected Systems
- go-ipld-prime DAG-CBOR Decoder
-
go-ipld-prime: < 0.22.0 (Fixed in:
0.22.0)
Code Analysis
Commit: e43bf4a
Fix unbounded memory allocation during unmarshal in dagcbor codec
Exploit Details
- Patch Unit Tests: Unit tests verifying allocation cap behavior provide a logical structure for reproduction.
Mitigation Strategies
- Upgrade go-ipld-prime to version 0.22.0
- Implement application-level recovery and health checks to restart crashed Go services
- Audit dependency trees for transitive inclusions of vulnerable go-ipld-prime versions
Remediation Steps:
- Update go.mod to specify github.com/ipld/go-ipld-prime v0.22.0
- Execute 'go mod tidy' to synchronize dependencies
- Recompile the application and deploy the updated binaries
- Monitor application memory metrics post-deployment to ensure stable baseline consumption
References
- GHSA-378j-3jfj-8r9f Advisory
- go-ipld-prime Security Advisory
- Fix Commit e43bf4a27055fe8d895671a731ee5041e2d983a9
- CVE-2026-35480 Record
- go-ipld-prime v0.22.0 Release Notes
Read the full report for CVE-2026-35480 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)