GO-2023-1883

Source
https://pkg.go.dev/vuln/GO-2023-1883
Import Source
https://vuln.go.dev/ID/GO-2023-1883.json
JSON Data
https://api.test.osv.dev/v1/vulns/GO-2023-1883
Aliases
Published
2023-07-13T22:19:53Z
Modified
2024-05-20T16:03:47Z
Summary
Denial of service via OOM in github.com/cometbft/cometbft
Details

A bug in the CometBFT middleware causes the mempool's two data structures to fall out of sync. This can lead to duplicate transactions that cannot be removed, even after they are committed in a block. The only way to remove the transaction is to restart the node. This can be exploited by an attacker to bring down a node by repeatedly submitting duplicate transactions.

Database specific
{
    "url": "https://pkg.go.dev/vuln/GO-2023-1883",
    "review_status": "REVIEWED"
}
References

Affected packages

Go / github.com/cometbft/cometbft

Package

Name
github.com/cometbft/cometbft
View open source insights on deps.dev
Purl
pkg:golang/github.com/cometbft/cometbft

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.37.2

Ecosystem specific

{
    "imports": [
        {
            "symbols": [
                "CListMempool.CheckTx",
                "CListMempool.resCbFirstTime",
                "Reactor.ReceiveEnvelope"
            ],
            "path": "github.com/cometbft/cometbft/mempool/v0"
        }
    ]
}