Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-45699

An issue was discovered in the ckb crate before 0.40.0 for Rust. Remote attackers may be able to conduct a 51% attack against the Nervos CKB blockchain by triggering an inability to allocate memory for the misbehavior HashMap.

CVE
#dos#git

```toml [advisory] id = “RUSTSEC-2021-0108” package = “ckb” date = “2021-07-25” url = “https://github.com/nervosnetwork/ckb/security/advisories/GHSA-48vq-8jqv-gm6f” aliases = [“GHSA-48vq-8jqv-gm6f”] [versions] patched = [“>= 0.40.0”] ``` # Remote memory exhaustion in ckb In the ckb sync protocol, SyncState maintains a HashMap called ‘misbehavior’ that keeps a score of a peer’s violations of the protocol. This HashMap is keyed to PeerIndex (an alias for SessionId), and entries are never removed from it. SessionId is an integer that increases monotonically with every new connection. A remote attacker can manipulate this HashMap to grow forever, resulting in degraded performance and ultimately a panic on allocation failure or being killed by the OS, depending on the platform. This is a critical severity security bug. It could be exploited to create a targeted or network-wide denial of service, to reduce the hash power of the network as part of a 51% attack, and perhaps in other creative ways.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907