Skip to content

[GHSA-mq3p-rrmp-79jg] go-ethereum is vulnerable to high CPU usage leading to DoS via malicious p2p message#7103

Open
timothyfraser1955-del wants to merge 1 commit intotimothyfraser1955-del/advisory-improvement-7103from
timothyfraser1955-del-GHSA-mq3p-rrmp-79jg
Open

[GHSA-mq3p-rrmp-79jg] go-ethereum is vulnerable to high CPU usage leading to DoS via malicious p2p message#7103
timothyfraser1955-del wants to merge 1 commit intotimothyfraser1955-del/advisory-improvement-7103from
timothyfraser1955-del-GHSA-mq3p-rrmp-79jg

Conversation

@timothyfraser1955-del
Copy link

Updates

  • CVSS v4
  • Severity

Comments
Vunerbilities

@github
Copy link
Collaborator

github commented Mar 4, 2026

Hi there @fjl! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository.

This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory

Copilot AI review requested due to automatic review settings March 4, 2026 00:12
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates the recorded severity metadata for GHSA-mq3p-rrmp-79jg (go-ethereum malicious p2p message causing high CPU usage/DoS) by revising the CVSS v4 vector and raising the advisory severity classification.

Changes:

  • Updated modified timestamp.
  • Updated CVSS v4 vector string.
  • Changed database_specific.severity from HIGH to CRITICAL.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N"
Copy link

Copilot AI Mar 4, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The CVSS v4 vector sets confidentiality/integrity impacts (VC/VI) and subsequent system impacts (SC/SI) to High, but this advisory’s summary/details describe a CPU-exhaustion DoS. Unless there’s evidence of data compromise or downstream system impact, the vector should reflect availability-only impact (e.g., VC:N/VI:N with VA:H and typically SC/SI:N). Please re-check the CVSS v4 scoring source (GitHub/NVD) and update the vector accordingly.

Suggested change
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N"
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"

Copilot uses AI. Check for mistakes.
"CWE-400"
],
"severity": "HIGH",
"severity": "CRITICAL",
Copy link

Copilot AI Mar 4, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

database_specific.severity was bumped to CRITICAL, but the described impact is a DoS via high CPU usage. In this repo, similar availability-only CVSS v4 vectors are typically categorized as HIGH (for example, GHSA-8r9q-7v3j-jr4g uses an availability-only CVSS v4 vector and severity: HIGH). After correcting/confirming the CVSS vector, please ensure this severity value matches the assessed impact.

Suggested change
"severity": "CRITICAL",
"severity": "HIGH",

Copilot uses AI. Check for mistakes.
@github-actions github-actions bot changed the base branch from main to timothyfraser1955-del/advisory-improvement-7103 March 4, 2026 00:17
@JonathanLEvans
Copy link

Hi @timothyfraser1955-del,

Thank you for your interest in improving this advisory. Could you explain why these changes need to be made?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants