Vulnerability Description
go-spacemesh is a Go implementation of the Spacemesh protocol full node. Nodes can publish activations transactions (ATXs) which reference the incorrect previous ATX of the Smesher that created the ATX. ATXs are expected to form a single chain from the newest to the first ATX ever published by an identity. Allowing Smeshers to reference an earlier (but not the latest) ATX as previous breaks this protocol rule and can serve as an attack vector where Nodes are rewarded for holding their PoST data for less than one epoch but still being eligible for rewards. This vulnerability is fixed in go-spacemesh 1.5.2-hotfix1 and Spacemesh API 1.37.1.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/spacemeshos/api/commit/1d5bd972bbe225d024c3e0ae5214ddb6b48171
- https://github.com/spacemeshos/go-spacemesh/commit/9aff88d54be809ac43d60e8a8b4d6
- https://github.com/spacemeshos/go-spacemesh/security/advisories/GHSA-jcqq-g64v-g
- https://github.com/spacemeshos/api/commit/1d5bd972bbe225d024c3e0ae5214ddb6b48171
- https://github.com/spacemeshos/go-spacemesh/commit/9aff88d54be809ac43d60e8a8b4d6
- https://github.com/spacemeshos/go-spacemesh/security/advisories/GHSA-jcqq-g64v-g
FAQ
What is CVE-2024-34360?
CVE-2024-34360 is a vulnerability with a CVSS score of 8.2 (HIGH). go-spacemesh is a Go implementation of the Spacemesh protocol full node. Nodes can publish activations transactions (ATXs) which reference the incorrect previous ATX of the Smesher that created the AT...
How severe is CVE-2024-34360?
CVE-2024-34360 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-34360?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.