Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the processPieceFromSource method does not update the structure’s usedTraffic field, because an uninitialized variable n is used as a guard to the AddTraffic method call, instead of the result.Size variable. A task is processed by a peer. The usedTraffic metadata is not updated during the processing. Rate limiting is incorrectly applied, leading to a denial-of-service condition for the peer. This vulnerability is fixed in 2.1.0.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Sep 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linuxfoundation
Linuxfoundation dragonfly |
|
CPEs | cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:* | |
Vendors & Products |
Linuxfoundation
Linuxfoundation dragonfly |
|
Metrics |
cvssV3_1
|
Thu, 18 Sep 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dragonflyoss
Dragonflyoss dragonfly2 |
|
Vendors & Products |
Dragonflyoss
Dragonflyoss dragonfly2 |
Wed, 17 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 17 Sep 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the processPieceFromSource method does not update the structure’s usedTraffic field, because an uninitialized variable n is used as a guard to the AddTraffic method call, instead of the result.Size variable. A task is processed by a peer. The usedTraffic metadata is not updated during the processing. Rate limiting is incorrectly applied, leading to a denial-of-service condition for the peer. This vulnerability is fixed in 2.1.0. | |
Title | Dragonfly incorrectly handles a task structure’s usedTraffic field | |
Weaknesses | CWE-457 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-09-17T19:30:22.841Z
Updated: 2025-09-17T19:45:03.134Z
Reserved: 2025-09-12T12:36:24.637Z
Link: CVE-2025-59348

Updated: 2025-09-17T19:44:56.392Z

Status : Analyzed
Published: 2025-09-17T20:15:37.040
Modified: 2025-09-18T20:18:46.437
Link: CVE-2025-59348

No data.