CVE-2026-44500
Description
ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.4.0, prior to zebra-chain version 7.0.0, and prior to zebra-network version 6.0.0, several inbound deserialization paths in Zebra allocated buffers sized against generic transport or block-size ceilings before the tighter protocol or consensus limits were enforced. An unauthenticated or post-handshake peer could therefore force the node to preallocate and parse for orders of magnitude more data than the protocol intended, across headers messages, equihash solutions in block headers, Sapling spend vectors in V5/V4 transactions, and coinbase script bytes in blocks. This issue has been patched in zebrad version 4.4.0, zebra-chain version 7.0.0, and zebra-network version 6.0.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
zebra-networkcrates.io | < 6.0.0 | 6.0.0 |
zebradcrates.io | < 4.4.0 | 4.4.0 |
zebra-chaincrates.io | < 7.0.0 | 7.0.0 |
Affected products
4- Range: <= 6.0.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/ZcashFoundation/zebra/security/advisories/GHSA-438q-jx8f-cccvnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-438q-jx8f-cccvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-44500ghsaADVISORY
- github.com/ZcashFoundation/zebra/releases/tag/v4.4.0ghsaWEB
News mentions
0No linked articles in our index yet.