First published: Sat Nov 12 2022(Updated: )
Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer crash) by repeatedly sending a crafted channel tx with the same Channel name. NOTE: the official Fabric with Raft prevents exploitation via a locking mechanism and a check for names that already exist.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hyperledger Fabric | =2.3 | |
=2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45196 is a vulnerability in Hyperledger Fabric 2.3 that allows attackers to cause a denial of service (orderer crash) by repeatedly sending a crafted channel tx with the same Channel name.
CVE-2022-45196 has a severity rating of 7.5, which is considered high.
CVE-2022-45196 affects Hyperledger Fabric 2.3 by allowing attackers to cause a denial of service (orderer crash) by repeatedly sending a crafted channel tx with the same Channel name.
Yes, there is a fix available for CVE-2022-45196. It is recommended to update to the latest version of Hyperledger Fabric.
More information about CVE-2022-45196 can be found in the following references: [https://github.com/SmartBFT-Go/fabric/issues/286](https://github.com/SmartBFT-Go/fabric/issues/286) and [https://github.com/hyperledger/fabric/pull/2934](https://github.com/hyperledger/fabric/pull/2934).