Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2566 | go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node, can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix is included in geth version `1.12.1-stable`, i.e, `1.12.2-unstable` and onwards. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-ppjg-v974-84cm | Go-Ethereum vulnerable to denial of service via malicious p2p message |
Thu, 26 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-26T15:19:33.428Z
Reserved: 2023-08-16T18:24:02.393Z
Link: CVE-2023-40591
Updated: 2024-08-02T18:38:50.931Z
Status : Modified
Published: 2023-09-06T19:15:44.100
Modified: 2024-11-21T08:19:46.860
Link: CVE-2023-40591
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA