Description
libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique namespaces in a loop and the server happily accepts every single one allocating memory for each registration with no pushback. Keep doing this long enough (or with multiple sybil peers) and the server process gets OOM killed. This vulnerability is fixed in 0.17.1.
Published: 2026-04-07
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability lies in the libp2p‑rendezvous server’s lack of enforcement on namespace registrations. A malicious peer can repeatedly register unique namespaces, each registration allocating memory on the server without any limits. This unbounded growth can consume all available memory, ultimately leading to an out‑of‑process termination of the server. The core weakness is an uncontrolled resource consumption error, identified as CWE‑770. The impact manifests as service disruption, denying legitimate peers from utilizing the rendezvous service.

Affected Systems

The affected component is the libp2p‑rendezvous server implemented in the Rust libp2p networking stack. Versions prior to 0.17.1 are susceptible. Any system running the server in this version range is at risk.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity for this resource exhaustion flaw. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited publicly known exploitation. Based on the description, the likely attack vector is a remote peer connecting to the rendezvous server and issuing namespace registration requests, which the server accepts unconditionally, allowing a distributed or single adversary to trigger service failure.

Generated by OpenCVE AI on April 7, 2026 at 20:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade rust‑libp2p to version 0.17.1 or newer to apply the official patch.

Generated by OpenCVE AI on April 7, 2026 at 20:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-cqfx-gf56-8x59 libp2p-rendezvous: Unlimited namespace registrations per peer enables OOM DoS on rendezvous servers
History

Fri, 24 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Protocol
Protocol libp2p
CPEs cpe:2.3:a:protocol:libp2p:*:*:*:*:*:rust:*:*
Vendors & Products Protocol
Protocol libp2p

Thu, 09 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Libp2p
Libp2p rust-libp2p
Vendors & Products Libp2p
Libp2p rust-libp2p

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique namespaces in a loop and the server happily accepts every single one allocating memory for each registration with no pushback. Keep doing this long enough (or with multiple sybil peers) and the server process gets OOM killed. This vulnerability is fixed in 0.17.1.
Title libp2p-rendezvous: Unlimited namespace registrations per peer enables OOM DoS on rendezvous servers
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Libp2p Rust-libp2p
Protocol Libp2p
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T17:44:08.836Z

Reserved: 2026-04-02T17:03:42.075Z

Link: CVE-2026-35405

cve-icon Vulnrichment

Updated: 2026-04-09T17:43:54.490Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T15:17:43.367

Modified: 2026-04-24T13:37:22.880

Link: CVE-2026-35405

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:24:22Z

Weaknesses