An integer overflow in Nethermind Juno before v0.12.5 within the Sierra bytecode decompression logic within the "cairo-lang-starknet-classes" library could allow remote attackers to trigger an infinite loop (and high CPU usage) by submitting a malicious Declare v2/v3 transaction. This results in a denial-of-service condition for affected Starknet full-node implementations.
{ "nvd_published_at": "2025-03-27T16:15:30Z", "cwe_ids": [ "CWE-190", "CWE-770" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-03-28T22:04:59Z" }