{"id":"CVE-2022-29177","summary":"DoS via malicious p2p message in Go-Ethereum","details":"Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.17, a vulnerable node, if configured to use high verbosity logging, can be made to crash when handling specially crafted p2p messages sent from an attacker node. Version 1.10.17 contains a patch that addresses the problem. As a workaround, setting loglevel to default level (`INFO`) makes the node not vulnerable to this attack.","aliases":["GHSA-wjxw-gh3m-7pm5","GO-2022-0456"],"modified":"2026-04-10T04:47:09.055032Z","published":"2022-05-20T16:20:10Z","related":["openSUSE-SU-2025:15424-1"],"database_specific":{"cwe_ids":["CWE-400"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/29xxx/CVE-2022-29177.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/29xxx/CVE-2022-29177.json"},{"type":"ADVISORY","url":"https://github.com/ethereum/go-ethereum/security/advisories/GHSA-wjxw-gh3m-7pm5"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29177"},{"type":"FIX","url":"https://github.com/ethereum/go-ethereum/pull/24507"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ethereum/go-ethereum","events":[{"introduced":"0"},{"fixed":"25c9b49fdb74931137431c24cf28d3c65f9420d2"}]}],"versions":["0.2.2","0.3.0","0.3.1","0.5.13","0.5.14","0.5.15","0.5.16","0.5.17","0.5.18","0.5.19","0.9.16","0.9.23","2","poc1","poc5-rc1","poc5-rc10","poc5-rc11","poc5-rc12","poc5-rc2","poc5-rc3","poc5-rc4","poc5-rc6","poc5-rc7","poc5-rc8","poc5-rc9","v0.8.4","v0.9.17","v0.9.18","v0.9.20","v0.9.21","v0.9.22","v0.9.23","v0.9.24","v0.9.25","v0.9.26","v0.9.28","v0.9.30","v0.9.32","v0.9.34","v0.9.34-1","v0.9.36","v0.9.38","v1.0.1","v1.10.0","v1.10.1","v1.10.10","v1.10.11","v1.10.12","v1.10.13","v1.10.14","v1.10.15","v1.10.16","v1.10.2","v1.10.3","v1.10.4","v1.10.5","v1.10.6","v1.10.7","v1.10.8","v1.10.9","v1.5.0","v1.5.1","v1.5.2","v1.5.3","v1.5.4","v1.5.5","v1.5.6","v1.5.7","v1.5.8","v1.5.9","v1.6.0","v1.6.1","v1.6.2","v1.6.3","v1.6.4","v1.6.5","v1.6.6","v1.6.7","v1.7.0","v1.7.1","v1.7.2","v1.7.3","v1.8.0","v1.8.1","v1.8.10","v1.8.11","v1.8.12","v1.8.13","v1.8.14","v1.8.15","v1.8.16","v1.8.17","v1.8.18","v1.8.19","v1.8.2","v1.8.20","v1.8.21","v1.8.3","v1.8.4","v1.8.5","v1.8.6","v1.8.7","v1.8.8","v1.8.9","v1.9.0","v1.9.1","v1.9.10","v1.9.11","v1.9.12","v1.9.13","v1.9.14","v1.9.15","v1.9.16","v1.9.17","v1.9.18","v1.9.19","v1.9.2","v1.9.20","v1.9.21","v1.9.22","v1.9.23","v1.9.24","v1.9.25","v1.9.3","v1.9.4","v1.9.5","v1.9.6","v1.9.7","v1.9.8","v1.9.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-29177.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}