GMS-2021-176: Denial of service in go-ethereum due to CVE-2020-28362
(updated )
Impact
Versions of Geth built with Go <1.15.5
or <1.14.12
are most likely affected by a critical DoS-related security vulnerability. The golang team has registered the underlying flaw as ‘CVE-2020-28362’.
We recommend all users to rebuild (ideally v1.9.24
) with Go 1.15.5
or 1.14.12
, to avoid node crashes. Alternatively, if you are running binaries distributed via one of our official channels, we’re going to release v1.9.24
ourselves built with Go 1.15.5
.
Patches
This is not an issue in go-ethereum, rebuilding an older version with Go 1.15.5
or 1.14.12
will suffice to address the vulnerability.
Workarounds
Rebuilding with Go 1.15.5
or 1.14.12
will suffice to address the vulnerability.
References
- https://blog.ethereum.org/2020/11/12/geth_security_release/
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
For more information
If you have any questions or comments about this advisory:
- Open an issue in go-ethereum
- Email us at security@ethereum.org
References
Detect and mitigate GMS-2021-176 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →