A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node.
The p2p handler spawned a new goroutine to respond to ping
requests. By flooding a node with ping requests, an unbounded number of goroutines can be created, leading to resource exhaustion and potentially crash due to OOM.
The fix is included in geth version 1.12.1-stable
, i.e, 1.12.2-unstable
and onwards.
Fixed by https://github.com/ethereum/go-ethereum/pull/27887
No known workarounds.
This bug was reported by Patrick McHardy and reported via bounty@ethereum.org.
{ "nvd_published_at": "2023-09-06T19:15:44Z", "cwe_ids": [ "CWE-400" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-09-06T19:49:46Z" }