CVE-2025-29072

An integer overflow in Nethermind Juno before v.12.05 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:nethermind:juno:*:*:*:*:*:*:*:*

History

11 Apr 2025, 17:20

Type Values Removed Values Added
References () https://github.com/NethermindEth/juno/commit/51074875941aa111c5dd2b41f2ec890a4a15b587 - () https://github.com/NethermindEth/juno/commit/51074875941aa111c5dd2b41f2ec890a4a15b587 - Patch
References () https://community.starknet.io/t/starknet-security-update-potential-full-node-vulnerability-recap/115314 - () https://community.starknet.io/t/starknet-security-update-potential-full-node-vulnerability-recap/115314 - Third Party Advisory
First Time Nethermind juno
Nethermind
CPE cpe:2.3:a:nethermind:juno:*:*:*:*:*:*:*:*

27 Mar 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 16:15

Updated : 2025-04-11 17:20


NVD link : CVE-2025-29072

Mitre link : CVE-2025-29072


JSON object : View

Products Affected

nethermind

  • juno
CWE

No CWE.