GHSA-q26p-9cq4-7fc2

Suggest an improvement
Source
https://github.com/advisories/GHSA-q26p-9cq4-7fc2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-q26p-9cq4-7fc2/GHSA-q26p-9cq4-7fc2.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-q26p-9cq4-7fc2
Aliases
Published
2025-01-30T17:51:57Z
Modified
2025-02-05T16:25:09Z
Severity
  • 6.6 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
Go Ethereum vulnerable to DoS via malicious p2p message
Details

Impact

A vulnerable node can be forced to shutdown/crash using a specially crafted message.

More in-depth details will be released at a later time.

Patches

A fix has been included in geth version 1.14.13 and onwards.

Workarounds

Unfortunately, no workaround is available.

Credits

This issue was originally reported to Polygon Security by David Matosse (@iam-ned).

Database specific
{
    "nvd_published_at": "2025-01-30T16:15:31Z",
    "cwe_ids": [
        "CWE-20",
        "CWE-248"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2025-01-30T17:51:57Z"
}
References

Affected packages

Go / github.com/ethereum/go-ethereum

Package

Name
github.com/ethereum/go-ethereum
View open source insights on deps.dev
Purl
pkg:golang/github.com/ethereum/go-ethereum

Affected ranges

Type
SEMVER
Events
Introduced
1.14.0
Fixed
1.14.13