You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix is included in geth version 1.12.1-stable, i.e, 1.12.2-unstable and onwards. Users are advised to upgrade. There are no known workarounds for this vulnerability.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/ethereum/go-ethereum
vulnerable_at: 1.12.2
packages:
- package: go-ethereum
description: |-
go-ethereum (geth) is a golang execution layer implementation of the Ethereum
protocol. A vulnerable node, can be made to consume unbounded amounts of memory
when handling specially crafted p2p messages sent from an attacker node. The fix
is included in geth version `1.12.1-stable`, i.e, `1.12.2-unstable` and onwards.
Users are advised to upgrade. There are no known workarounds for this
vulnerability.
cves:
- CVE-2023-40591
references:
- advisory: https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm
- web: https://geth.ethereum.org/docs/developers/geth-developer/disclosures
- web: https://github.com/ethereum/go-ethereum/releases/tag/v1.12.1
The text was updated successfully, but these errors were encountered:
CVE-2023-40591 references github.com/ethereum/go-ethereum, which may be a Go module.
Description:
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix is included in geth version
1.12.1-stable
, i.e,1.12.2-unstable
and onwards. Users are advised to upgrade. There are no known workarounds for this vulnerability.References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: