Skip to content

DoS via malicious p2p message

Low
holiman published GHSA-wjxw-gh3m-7pm5 May 11, 2022

Package

gomod go-ethereum (Go)

Affected versions

<1.10.17

Patched versions

1.10.17

Description

Impact

A vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node.

Patches

The following PR addresses the problem: #24507

Workarounds

Aside from applying the PR linked above, setting loglevel to default level (INFO) makes the node not vulnerable to this attack.

Credits

This bug was reported by nrv via bounty@ethereum.org, who has gracefully requested that the bounty rewards be donated to Médecins sans frontières.

For more information

If you have any questions or comments about this advisory:

Severity

Low

CVE ID

CVE-2022-29177

Weaknesses

No CWEs