VYPR
Low severityNVD Advisory· Published Apr 10, 2020· Updated Aug 4, 2024

Denial of service in Tendermint

CVE-2020-5303

Description

Tendermint before versions 0.33.3, 0.32.10, and 0.31.12 has a denial-of-service vulnerability. Tendermint does not limit the number of P2P connection requests. For each p2p connection, it allocates XXX bytes. Even though this memory is garbage collected once the connection is terminated (due to duplicate IP or reaching a maximum number of inbound peers), temporary memory spikes can lead to OOM (Out-Of-Memory) exceptions. Additionally, Tendermint does not reclaim activeID of a peer after it's removed in Mempool reactor. This does not happen all the time. It only happens when a connection fails (for any reason) before the Peer is created and added to all reactors. RemovePeer is therefore called before AddPeer, which leads to always growing memory (activeIDs map). The activeIDs map has a maximum size of 65535 and the node will panic if this map reaches the maximum. An attacker can create a lot of connection attempts (exploiting above denial of service), which ultimately will lead to the node panicking. These issues are patched in Tendermint 0.33.3 and 0.32.10.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/tendermint/tendermintGo
>= 0.33.0, < 0.33.30.33.3
github.com/tendermint/tendermintGo
< 0.31.120.31.12
github.com/tendermint/tendermintGo
>= 0.32.0, < 0.32.100.32.10

Affected products

1

Patches

1
e2d6859afd7d

p2p: limit the number of incoming connections

https://github.com/tendermint/tendermintAnton KaliaevApr 3, 2020via ghsa
3 files changed · +64 2
  • node/node.go+5 0 modified
    @@ -471,6 +471,11 @@ func createTransport(
     	}
     
     	p2p.MultiplexTransportConnFilters(connFilters...)(transport)
    +
    +	// Limit the number of incoming connections.
    +	max := config.P2P.MaxNumInboundPeers + len(splitAndTrimEmpty(config.P2P.UnconditionalPeerIDs, ",", " "))
    +	p2p.MultiplexTransportMaxIncomingConnections(max)(transport)
    +
     	return transport, peerFilters
     }
     
    
  • p2p/transport.go+14 2 modified
    @@ -7,6 +7,7 @@ import (
     	"time"
     
     	"github.com/pkg/errors"
    +	"golang.org/x/net/netutil"
     
     	"github.com/tendermint/tendermint/crypto"
     	"github.com/tendermint/tendermint/p2p/conn"
    @@ -122,11 +123,18 @@ func MultiplexTransportResolver(resolver IPResolver) MultiplexTransportOption {
     	return func(mt *MultiplexTransport) { mt.resolver = resolver }
     }
     
    +// MultiplexTransportMaxIncomingConnections sets the maximum number of
    +// simultaneous connections (incoming). Default: 0 (unlimited)
    +func MultiplexTransportMaxIncomingConnections(n int) MultiplexTransportOption {
    +	return func(mt *MultiplexTransport) { mt.maxIncomingConnections = n }
    +}
    +
     // MultiplexTransport accepts and dials tcp connections and upgrades them to
     // multiplexed peers.
     type MultiplexTransport struct {
    -	netAddr  NetAddress
    -	listener net.Listener
    +	netAddr                NetAddress
    +	listener               net.Listener
    +	maxIncomingConnections int // see MaxIncomingConnections
     
     	acceptc chan accept
     	closec  chan struct{}
    @@ -240,6 +248,10 @@ func (mt *MultiplexTransport) Listen(addr NetAddress) error {
     		return err
     	}
     
    +	if mt.maxIncomingConnections > 0 {
    +		ln = netutil.LimitListener(ln, mt.maxIncomingConnections)
    +	}
    +
     	mt.netAddr = addr
     	mt.listener = ln
     
    
  • p2p/transport_test.go+45 0 modified
    @@ -5,6 +5,7 @@ import (
     	"math/rand"
     	"net"
     	"reflect"
    +	"strings"
     	"testing"
     	"time"
     
    @@ -134,6 +135,50 @@ func TestTransportMultiplexConnFilterTimeout(t *testing.T) {
     	}
     }
     
    +func TestTransportMultiplexMaxIncomingConnections(t *testing.T) {
    +	mt := newMultiplexTransport(
    +		emptyNodeInfo(),
    +		NodeKey{
    +			PrivKey: ed25519.GenPrivKey(),
    +		},
    +	)
    +	id := mt.nodeKey.ID()
    +
    +	MultiplexTransportMaxIncomingConnections(0)(mt)
    +
    +	addr, err := NewNetAddressString(IDAddressString(id, "127.0.0.1:0"))
    +	if err != nil {
    +		t.Fatal(err)
    +	}
    +
    +	if err := mt.Listen(*addr); err != nil {
    +		t.Fatal(err)
    +	}
    +
    +	errc := make(chan error)
    +
    +	go func() {
    +		addr := NewNetAddress(id, mt.listener.Addr())
    +
    +		_, err := addr.Dial()
    +		if err != nil {
    +			errc <- err
    +			return
    +		}
    +
    +		close(errc)
    +	}()
    +
    +	if err := <-errc; err != nil {
    +		t.Errorf("connection failed: %v", err)
    +	}
    +
    +	_, err = mt.Accept(peerConfig{})
    +	if err == nil || !strings.Contains(err.Error(), "connection reset by peer") {
    +		t.Errorf("expected connection reset by peer error, got %v", err)
    +	}
    +}
    +
     func TestTransportMultiplexAcceptMultiple(t *testing.T) {
     	mt := testSetupMultiplexTransport(t)
     	laddr := NewNetAddress(mt.nodeKey.ID(), mt.listener.Addr())
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.