Loading HuntDB...

GHSA-4mhv-8rh3-4ghw

GitHub Security Advisory

DragonFly vulnerable to panics due to nil pointer dereference when using variables created alongside an error

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
We found two instances in the DragonFly codebase where the first return value of a function is dereferenced even when the function returns an error (figures 9.1 and 9.2). This can result in a nil dereference, and cause code to panic. The codebase may contain additional instances of the bug.

```golang
request, err := source.NewRequestWithContext(ctx, parentReq.Url,
parentReq.UrlMeta.Header)
if err != nil {
log.Errorf("generate url [%v] request error: %v", request.URL, err)
span.RecordError(err)
return err
}
```

Eve is a malicious actor operating a peer machine. She sends a dfdaemonv1.DownRequest request to her peer Alice. Alice’s machine receives the request, resolves a nil variable in the server.Download method, and panics.

### Patches

- Dragonfy v2.1.0 and above.

### Workarounds

There are no effective workarounds, beyond upgrading.

### References

A third party security audit was performed by Trail of Bits, you can see the [full report](https://github.com/dragonflyoss/dragonfly/blob/main/docs/security/dragonfly-comprehensive-report-2023.pdf).

If you have any questions or comments about this advisory, please email us at [[email protected]](mailto:[email protected]).

Affected Packages

Go github.com/dragonflyoss/dragonfly
Affected versions: 0 (fixed in 2.1.0)

Related CVEs

Key Information

GHSA ID
GHSA-4mhv-8rh3-4ghw
Published
September 17, 2025 8:10 PM
Last Modified
September 17, 2025 8:10 PM
CVSS Score
5.0 /10
Primary Ecosystem
Go
Primary Package
github.com/dragonflyoss/dragonfly
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 18, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.