CVE-2024-32972

go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. Prior to 1.13.15, a vulnerable node can be made to consume very large amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix has been included in geth version `1.13.15` and onwards.
Configurations

No configuration.

History

21 Nov 2024, 09:16

Type Values Removed Values Added
References () https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15 - () https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15 -
References () https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652 - () https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652 -
Summary
  • (es) go-ethereum (geth) es una implementación de la capa de ejecución golang del protocolo Ethereum. Antes de 13.01.15, se podía hacer que un nodo vulnerable consumiera cantidades muy grandes de memoria al manejar mensajes p2p especialmente manipulados enviados desde un nodo atacante. La solución se incluyó en la versión geth `1.13.15` y posteriores.

06 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-06 15:15

Updated : 2024-11-21 09:16


NVD link : CVE-2024-32972

Mitre link : CVE-2024-32972

CVE.ORG link : CVE-2024-32972


JSON object : View

Products Affected

No product.

CWE
CWE-400

Uncontrolled Resource Consumption