Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer crash) by repeatedly sending a crafted channel tx with the same Channel name. NOTE: the official Fabric with Raft prevents exploitation via a locking mechanism and a check for names that already exist.
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.
Link | Tags |
---|---|
https://github.com/SmartBFT-Go/fabric/issues/286 | issue tracking exploit third party advisory |
https://github.com/hyperledger/fabric/pull/2934 | third party advisory patch |