Vulnerability Report: GO-2023-2024

A malicious actor can store an arbitrary amount of data in the memory of a remote node by sending the node a message with a signed peer record. Signed peer records from randomly generated peers can be sent by a malicious actor. This memory does not get garbage collected and so the remote node can run out of memory (OOM).

For detailed information about this vulnerability, visit https://github.com/libp2p/go-libp2p/security/advisories/GHSA-gcq9-qqwx-rgj3.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL