GHSA-wjxw-gh3m-7pm5

Source
https://github.com/advisories/GHSA-wjxw-gh3m-7pm5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wjxw-gh3m-7pm5/GHSA-wjxw-gh3m-7pm5.json
Aliases
Published
2022-05-24T20:54:55Z
Modified
2023-11-08T04:09:08.868343Z
Details

Impact

A vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node.

Patches

The following PR addresses the problem: https://github.com/ethereum/go-ethereum/pull/24507

Workarounds

Aside from applying the PR linked above, setting loglevel to default level (INFO) makes the node not vulnerable to this attack.

Credits

This bug was reported by nrv via bounty@ethereum.org, who has gracefully requested that the bounty rewards be donated to Médecins sans frontières.

For more information

If you have any questions or comments about this advisory: * Open an issue in go-ethereum

References

Affected packages

Go / github.com/ethereum/go-ethereum

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.10.17