First published: Wed Dec 07 2022(Updated: )
libp2p-rust is the official rust language Implementation of the libp2p networking stack. In versions prior to 0.45.1 an attacker node can cause a victim node to allocate a large number of small memory chunks, which can ultimately lead to the victim’s process running out of memory and thus getting killed by its operating system. When executed continuously, this can lead to a denial of service attack, especially relevant on a larger scale when run against more than one node of a libp2p based network. Users are advised to upgrade to `libp2p` `v0.45.1` or above. Users unable to upgrade should reference the DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor their application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libp2p | <0.45.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23486 is a vulnerability in the libp2p-rust library that allows an attacker node to exhaust a victim node's memory resources.
The severity of CVE-2022-23486 is high with a CVSS score of 7.5.
CVE-2022-23486 affects versions of libp2p-rust prior to 0.45.1.
An attacker node can exploit CVE-2022-23486 by causing a victim node to allocate a large number of small memory chunks, which can lead to the victim's process running out of memory.
To mitigate CVE-2022-23486, users should update to version 0.45.1 or above of libp2p-rust.