logo

CVE-2024-34360 github.com/spacemeshos/go-spacemesh

Package

Manager: go
Name: github.com/spacemeshos/go-spacemesh
Vulnerable Version: >=0 <1.5.2-hotfix1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00083 pctl0.24965

Details

Previous ATX is not checked to be the newest valid ATX by Smesher when validating incoming ATX ### Impact Nodes can publish ATXs which reference the incorrect previous ATX of the Smesher that created the ATX. ATXs are expected to form a single chain from the newest to the first ATX ever published by an identity. Allowing Smeshers to reference an earlier (but not the latest) ATX as previous breaks this protocol rule and can serve as an attack vector where Nodes are rewarded for holding their PoST data for less than one epoch but still being eligible for rewards. ### Patches - API needs to be extended to be able to fetch events from a node that dected malicious behavior of this regard by the node - go-spacemesh needs to be patched to a) not allow publishing these ATXs any more and b) create malfeasance proofs for identities that published invalid ATXs in the past. ### Workarounds n/a ### References Spacemesh protocol whitepaper: https://spacemesh.io/blog/spacemesh-white-paper-1/, specifically sections 4.4.2 ("ATX Contents") and 4.4.3 ("ATX validity")

Metadata

Created: 2024-05-10T15:33:40Z
Modified: 2024-05-14T19:54:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-jcqq-g64v-gcm7/GHSA-jcqq-g64v-gcm7.json
CWE IDs: ["CWE-754"]
Alternative ID: GHSA-jcqq-g64v-gcm7
Finding: F002
Auto approve: 1