Описание
Nethermind Juno Potential Denial of Service (DoS) via Integer Overflow
An integer overflow in Nethermind Juno before v0.12.5 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-29072
- https://github.com/NethermindEth/juno/commit/51074875941aa111c5dd2b41f2ec890a4a15b587
- https://github.com/NethermindEth/juno/commit/b9fe28df6a4339a66f91bff723c61dc063f9ed50
- https://community.starknet.io/t/starknet-security-update-potential-full-node-vulnerability-recap/115314
Пакеты
github.com/NethermindEth/juno
< 0.12.5
0.12.5
Связанные уязвимости
An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.