Github.Com Ethereum Go-Ethereum vulnerabilities
26 known vulnerabilities affecting github.com/ethereum_go-ethereum.
Total CVEs
26
CISA KEV
0
Public exploits
0
Exploited in wild
1
Severity breakdown
HIGH13MEDIUM13
Vulnerabilities
Page 2 of 2
CVE-2020-26240MEDIUM≥ 0, < 1.9.242021-06-29
CVE-2020-26240 [MEDIUM] CWE-682 Erroneous Proof of Work calculation in geth
Erroneous Proof of Work calculation in geth
### Impact
An ethash mining DAG generation flaw in Geth could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected.
### Patches
This issue is also fixed as of 1.9.24. Thanks to @slavikus for bringing the issue to our
ghsaosv
CVE-2020-26265MEDIUM≥ 1.9.4, < 1.9.202021-06-29
CVE-2020-26265 [MEDIUM] CWE-682 Consensus flaw during block processing in github.com/ethereum/go-ethereum
Consensus flaw during block processing in github.com/ethereum/go-ethereum
### Impact
A consensus-vulnerability in Geth could cause a chain split, where vulnerable versions refuse to accept the canonical chain.
### Description
A flaw was repoted at 2020-08-11 by John Youngseok Yang (Software Platform Lab), where a particular sequence of transactions could cause a consensus failure.
- Tx
ghsaosv
CVE-2020-26242MEDIUM≥ 1.9.16, < 1.9.182021-06-29
CVE-2020-26242 [MEDIUM] CWE-125 Denial of service in geth
Denial of service in geth
### Impact
Denial-of-service (crash) during block processing
### Details
Affected versions suffer from a vulnerability which can be exploited through the `MULMOD` operation, by specifying a modulo of `0`: `mulmod(a,b,0)`, causing a `panic` in the underlying library.
The crash was in the `uint256` library, where a buffer [underflowed](https://github.com/holiman/uint256/blob/4ce82e695c10ddad57215bdbeafb68b8c5df2
ghsaosv
CVE-2020-26264MEDIUM≥ 0, < 1.9.252021-06-29
CVE-2020-26264 [MEDIUM] CWE-400 Denial of service in github.com/ethereum/go-ethereum
Denial of service in github.com/ethereum/go-ethereum
### Impact
A DoS vulnerability can make a LES server crash via malicious `GetProofsV2` request from a connected LES client.
### Patches
The vulnerability was patched in https://github.com/ethereum/go-ethereum/pull/21896.
### Workarounds
This vulnerability only concerns users explicitly enabling `les` server; disabling `les` prevents the exploit.
It can a
ghsaosv
CVE-2020-26241MEDIUM≥ 1.9.7, < 1.9.172021-06-29
CVE-2020-26241 [MEDIUM] CWE-682 Shallow copy bug in geth
Shallow copy bug in geth
### Impact
This is a Consensus vulnerability, which can be used to cause a chain-split where vulnerable nodes reject the canonical chain.
Geth’s pre-compiled `dataCopy` (at `0x00...04`) contract did a shallow copy on invocation. An attacker could deploy a contract that
- writes `X` to an EVM memory region `R`,
- calls `0x00..04` with `R` as an argument,
- overwrites `R` to `Y`,
- and finally invokes the `RETURND
ghsaosv
CVE-2018-16733HIGH≥ 0, < 1.8.142021-05-18
CVE-2018-16733 [HIGH] CWE-20 Go Ethereum Improper Input Validation
Go Ethereum Improper Input Validation
In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block.
### Specific Go Packages Affected
github.com/ethereum/go-ethereum/eth
ghsaosv
← Previous2 / 2