Description:
mx-chain-go is the official implementation of the MultiversX blockchain protocol, written in golang. When executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction's sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag RelayedNonceFixEnableEpoch was needed. This was a strict processing issue while validating blocks on a chain. This vulnerability has been patched in version 1.4.17.
Module github.com/multiversx/mx-chain-go appears in issue #1806 EFFECTIVELY_PRIVATE
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/multiversx/mx-chain-go
vulnerable_at: 1.5.10
packages:
- package: mx-chain-go
description: |-
mx-chain-go is the official implementation of the MultiversX blockchain
protocol, written in golang. When executing a relayed transaction, if the inner
transaction failed, it would have increased the inner transaction's sender
account nonce. This could have contributed to a limited DoS attack on a targeted
account. The fix is a breaking change so a new flag `RelayedNonceFixEnableEpoch`
was needed. This was a strict processing issue while validating blocks on a
chain. This vulnerability has been patched in version 1.4.17.
cves:
- CVE-2023-34458
references:
- advisory: https://github.com/multiversx/mx-chain-go/security/advisories/GHSA-j494-7x2v-vvvp
- fix: https://github.com/multiversx/mx-chain-go/commit/babdb144f1316ab6176bf3dbd7d4621120414d43
- web: https://github.com/multiversx/mx-chain-go/blob/babdb144f1316ab6176bf3dbd7d4621120414d43/integrationTests/vm/txsFee/relayedMoveBalance_test.go#LL165C14-L165C14
- web: https://github.com/multiversx/mx-chain-go/releases/tag/v1.4.17
CVE-2023-34458 references github.com/multiversx/mx-chain-go, which may be a Go module.
Description: mx-chain-go is the official implementation of the MultiversX blockchain protocol, written in golang. When executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction's sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag
RelayedNonceFixEnableEpoch
was needed. This was a strict processing issue while validating blocks on a chain. This vulnerability has been patched in version 1.4.17.References:
Cross references:
See doc/triage.md for instructions on how to triage this report.