Headline
GHSA-8m45-2rjm-j347: @solana/web3.js vulnerable to Denial of Service attack via Message/Transaction object deserialization
Using particular inputs with @solana/web3.js
will result in memory exhaustion (OOM).
If you have a server, client, mobile, or desktop product that accepts untrusted input for use with @solana/web3.js
, your application/service may crash, resulting in a loss of availability.
@solana/web3.js vulnerable to Denial of Service attack via Message/Transaction object deserialization
High severity GitHub Reviewed Published Apr 17, 2024 in solana-labs/solana-web3.js • Updated Apr 17, 2024