Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/ethereum/go-ethereum: CVE-2024-32972 #2820

Closed
GoVulnBot opened this issue May 6, 2024 · 2 comments
Assignees

Comments

@GoVulnBot
Copy link

CVE-2024-32972 references github.com/ethereum/go-ethereum, which may be a Go module.

Description:
go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to 1.13.15, a vulnerable node can be made to consume very large amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix has been included in geth version 1.13.15 and onwards.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/ethereum/go-ethereum
      vulnerable_at: 1.14.0
      packages:
        - package: go-ethereum
summary: CVE-2024-32972 in github.com/ethereum/go-ethereum
cves:
    - CVE-2024-32972
references:
    - advisory: https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652
    - web: https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15
source:
    id: CVE-2024-32972

@timothy-king timothy-king self-assigned this May 8, 2024
@timothy-king
Copy link
Contributor

Duplicate of #2819

@timothy-king timothy-king marked this as a duplicate of #2819 May 8, 2024
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/584157 mentions this issue: data/reports: add GO-2024-2819.yaml

# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

No branches or pull requests

3 participants