libp2p-rust is the official rust language Implementation of the libp2p networking stack. In versions prior to 0.49.3, the Gossipsub implementation accepts attacker-controlled PRUNE backoff values and may perform unchecked time arithmetic when storing backoff state. A specially crafted PRUNE control message with an extremely large backoff (e.g. u64::MAX) can lead to Duration/Instant overflow during backoff update logic, triggering a panic in the networking state machine. This is remotely reachable over a normal libp2p connection and does not require authentication. Any application exposing a libp2p Gossipsub listener and using the affected backoff-handling path can be crashed by a network attacker that can reach the service port. The attack can be repeated by reconnecting and replaying the crafted control message. This issue has been fixed in version 0.49.3.
References
| Link | Resource |
|---|---|
| https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-gc42-3jg7-rxr2 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 06:16
Updated : 2026-03-23 16:17
NVD link : CVE-2026-33040
Mitre link : CVE-2026-33040
CVE.ORG link : CVE-2026-33040
JSON object : View
Products Affected
protocol
- libp2p
CWE
CWE-190
Integer Overflow or Wraparound
