Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5589 | Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.17, a vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node. Version 1.10.17 contains a patch that addresses the problem. As a workaround, setting loglevel to default level (`INFO`) makes the node not vulnerable to this attack. |
Github GHSA |
GHSA-wjxw-gh3m-7pm5 | DoS via malicious p2p message in Go Ethereum |
Wed, 23 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T18:24:38.893Z
Reserved: 2022-04-13T00:00:00.000Z
Link: CVE-2022-29177
Updated: 2024-08-03T06:17:54.050Z
Status : Modified
Published: 2022-05-20T17:15:07.797
Modified: 2024-11-21T06:58:38.860
Link: CVE-2022-29177
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA