Skip to content

CometBFT is unstability during blocksync when syncing from malicious peer

Moderate severity GitHub Reviewed Published Jun 27, 2024 in cometbft/cometbft • Updated Jun 28, 2024

Package

gomod github.com/cometbft/cometbft (Go)

Affected versions

>= 0.37.0, < 0.37.7
>= 0.38.0, < 0.38.8

Patched versions

0.37.7
0.38.8

Description

Name: ASA-2024-008: Instability during blocksync when syncing from malicious peer
Component: CometBFT
Criticality: Medium (ACMv1: I:Moderate; L: Possible)
Affected versions: < v0.38.7

Summary

An issue was identified for nodes syncing on an existing network during blocksync in which a malicious peer could cause the syncing peer to panic, enter into a catastrophic invalid syncing state or get stuck in blocksync mode, never switching to consensus. It is recommended for all clients to adopt this patch so that blocksync functions as expected and is tolerant of malicious peers presenting invalid data in this situation. Nodes that are vulnerable to this state may experience a Denial of Service condition in which syncing will not work as expected when joining a network as a client.

Recognition

This issue was reported to the Cosmos Bug Bounty Program on HackerOne on 5/01/24 by unknown_feature. If you believe you have found a bug in the Interchain Stack or would like to contribute to the program by reporting a bug, please see https://hackerone.com/cosmos.

If you have questions about Interchain security efforts, please reach out to our official communication channel at [email protected].

For more information about CometBFT, please see https://docs.cometbft.com/.

For more information about the Interchain Foundation’s engagement with Amulet, please see https://github.com/interchainio/security.

References

@greg-szabo greg-szabo published to cometbft/cometbft Jun 27, 2024
Published to the GitHub Advisory Database Jun 28, 2024
Reviewed Jun 28, 2024
Last updated Jun 28, 2024

Severity

Moderate

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-hg58-rf2h-6rr7

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.