Vulnerability Details CVE-2026-35405
libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique namespaces in a loop and the server happily accepts every single one allocating memory for each registration with no pushback. Keep doing this long enough (or with multiple sybil peers) and the server process gets OOM killed. This vulnerability is fixed in 0.17.1.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 16.3%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2026-35405
-
cpe:2.3:a:protocol:libp2p:0.1.0
-
cpe:2.3:a:protocol:libp2p:0.10.0
-
cpe:2.3:a:protocol:libp2p:0.11.0
-
cpe:2.3:a:protocol:libp2p:0.12.0
-
cpe:2.3:a:protocol:libp2p:0.13.0
-
cpe:2.3:a:protocol:libp2p:0.13.1
-
cpe:2.3:a:protocol:libp2p:0.13.2
-
cpe:2.3:a:protocol:libp2p:0.14.0
-
cpe:2.3:a:protocol:libp2p:0.15.0
-
cpe:2.3:a:protocol:libp2p:0.16.0
-
cpe:2.3:a:protocol:libp2p:0.16.1
-
cpe:2.3:a:protocol:libp2p:0.16.2
-
cpe:2.3:a:protocol:libp2p:0.17.0
-
cpe:2.3:a:protocol:libp2p:0.2.0
-
cpe:2.3:a:protocol:libp2p:0.2.1
-
cpe:2.3:a:protocol:libp2p:0.2.2
-
cpe:2.3:a:protocol:libp2p:0.3.0
-
cpe:2.3:a:protocol:libp2p:0.3.1
-
cpe:2.3:a:protocol:libp2p:0.4.0
-
cpe:2.3:a:protocol:libp2p:0.4.1
-
cpe:2.3:a:protocol:libp2p:0.4.2
-
cpe:2.3:a:protocol:libp2p:0.5.0
-
cpe:2.3:a:protocol:libp2p:0.6.0
-
cpe:2.3:a:protocol:libp2p:0.7.0
-
cpe:2.3:a:protocol:libp2p:0.7.1
-
cpe:2.3:a:protocol:libp2p:0.8.0
-
cpe:2.3:a:protocol:libp2p:0.8.1
-
cpe:2.3:a:protocol:libp2p:0.9.0
-
cpe:2.3:a:protocol:libp2p:0.9.1
-
cpe:2.3:a:protocol:libp2p:0.9.2