Libp2P Go-Libp2P vulnerabilities
3 known vulnerabilities affecting libp2p/go-libp2p.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3
Vulnerabilities
Page 1 of 1
CVE-2023-40583HIGHCVSS 7.5fixed in 0.27.42023-08-25
CVE-2023-40583 [HIGH] CWE-400 CVE-2023-40583: libp2p is a networking stack and library modularized out of The IPFS Project, and bundled separately
libp2p is a networking stack and library modularized out of The IPFS Project, and bundled separately for other tools to use. In go-libp2p, by using signed peer records a malicious actor can store an arbitrary amount of data in a remote node’s memory. This memory does not get garbage collected and so the victim can run out of memory and crash. If users
nvd
CVE-2023-39533HIGHCVSS 7.5fixed in 0.27.8≥ 0.28.0, < 0.28.2+3 more2023-08-08
CVE-2023-39533 [HIGH] CWE-770 CVE-2023-39533: go-libp2p is the Go implementation of the libp2p Networking Stack. Prior to versions 0.27.8, 0.28.2,
go-libp2p is the Go implementation of the libp2p Networking Stack. Prior to versions 0.27.8, 0.28.2, and 0.29.1 malicious peer can use large RSA keys to run a resource exhaustion attack & force a node to spend time doing signature verification of the large key. This vulnerability is present in the core/crypto module of go-libp2p and can occur during t
nvd
CVE-2022-23492HIGHCVSS 7.5fixed in 0.18.02022-12-08
CVE-2022-23492 [HIGH] CWE-400 CVE-2022-23492: go-libp2p is the offical libp2p implementation in the Go programming language. Version `0.18.0` and
go-libp2p is the offical libp2p implementation in the Go programming language. Version `0.18.0` and older of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process g
nvd