Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-4xc9-8hmq-j652: go-ethereum vulnerable to DoS via malicious p2p message

### Impact A vulnerable node can be made to consume very large amounts of memory when handling specially crafted p2p messages sent from an attacker node. More in-depth details will be released at a later time. ### Patches The fix has been included in geth version `1.13.15` and onwards. ### Workarounds No workarounds have been made public. ### References No more information is released at this time. ### Credit This bug was responsibly disclosed by DongHan Kim via the Ethereum big bounty program, for which we're very grateful!

ghsa
GHSA-23qq-p4gq-gc2g: WordOps has TOCTOU race condition

WordOps through 3.20.0 has a `wo/cli/plugins/stack_pref.py` TOCTOU race condition because the `conf_path` `os.open` does not use a mode parameter during file creation.

#git
GHSA-vjc4-3vgx-pq9h: Nebari prints temporary Keycloak root password

Nebari through 2024.4.1 prints the temporary Keycloak root password.

GHSA-34rf-p3r3-58x2: Gradio's Component Server does not properly consider` _is_server_fn` for functions

Component Server in Gradio before 4.13 does not properly consider` _is_server_fn` for functions.

GHSA-m9vm-8mv9-v5v3: Ryu Infinite Loop vulnerability

`OFPFlowStats` in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via `inst.length=0`.

GHSA-c7w6-33j3-j3mx: Ryu Infinite Loop vulnerability

`OFPBucket` in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via `action.len=0`.

GHSA-ffp9-pfq9-g2ww: Ryu Infinite Loop vulnerability

`OFPMultipartReply` in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via `b.length=0`.

GHSA-3jgf-r68h-xfqm: btcd susceptible to consensus failures

btcd before 0.24.0 does not correctly implement the consensus rules outlined in BIP 68 and BIP 112, making it susceptible to consensus failures. Specifically, it uses the transaction version as a signed integer when it is supposed to be treated as unsigned. There can be a chain split and loss of funds.

GHSA-fgpw-cx3v-wj95: Ryu Infinite Loop vulnerability

`OFPPacketQueue` in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via `OFPQueueProp.len=0`.

GHSA-7hmm-wg23-2w7m: Ryu Infinite Loop vulnerability

`OFPGroupDescStats` in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via `OFPBucket.len=0`.