CVE-2025-29072: Nethermind Juno Potential Denial of Service (DoS) via Integer Overflow
(updated )
An integer overflow in Nethermind Juno before v0.12.5 within the Sierra bytecode decompression logic within the “cairo-lang-starknet-classes” library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.
References
- community.starknet.io/t/starknet-security-update-potential-full-node-vulnerability-recap/115314
- github.com/NethermindEth/juno
- github.com/NethermindEth/juno/commit/51074875941aa111c5dd2b41f2ec890a4a15b587
- github.com/NethermindEth/juno/commit/b9fe28df6a4339a66f91bff723c61dc063f9ed50
- github.com/advisories/GHSA-wq32-8rp4-w2mc
- nvd.nist.gov/vuln/detail/CVE-2025-29072
Code Behaviors & Features
Detect and mitigate CVE-2025-29072 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →