Integer Overflow or Wraparound Affecting libp2p-gossipsub package, versions <0.49.3


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Integer Overflow or Wraparound vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-LIBP2PGOSSIPSUB-15797948
  • published28 Mar 2026
  • disclosed20 Mar 2026
  • creditevofusion

Introduced: 20 Mar 2026

NewCVE-2026-33040  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade libp2p-gossipsub to version 0.49.3 or higher.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the backoff process. An attacker can cause the application to crash by sending specially crafted PRUNE control messages with extremely large backoff values, resulting in unchecked time arithmetic and triggering a panic in the networking state machine. This is remotely exploitable over a standard network connection without authentication.

CVSS Base Scores

version 4.0
version 3.1