CVE-2021-41173: Improper Neutralization
(updated )
Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.9, a vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer. Version v1.10.9 contains patches to the vulnerability. There are no known workarounds aside from upgrading.
References
- github.com/advisories/GHSA-59hh-656j-3p7v
- github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738
- github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8
- github.com/ethereum/go-ethereum/pull/23801
- github.com/ethereum/go-ethereum/releases/tag/v1.10.9
- github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v
- nvd.nist.gov/vuln/detail/CVE-2021-41173
- pkg.go.dev/vuln/GO-2022-0256
Detect and mitigate CVE-2021-41173 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →