Techub News: Babylon contributor @GrumpyLaurie55348 posted on GitHub stating that Babylon's BLS voting extension processing mechanism has a vulnerability that could allow malicious validators to cause disruption in the network consensus process. Attackers can intentionally omit the block hash field when sending blocks, causing other validators to crash at network cycle boundaries, thereby slowing down block production speed. The vulnerability has been rated as high severity, affecting versions prior to 4.2.0, and there are currently no reports of this vulnerability being exploited by users.
Techub News: Babylon contributor @GrumpyLaurie55348 posted on GitHub stating that Babylon's BLS voting extension processing mechanism has a vulnerability that could allow malicious validators to cause disruption in the network consensus process. Attackers can intentionally omit the block hash field when sending blocks, causing other validators to crash at network cycle boundaries, thereby slowing down block production speed. The vulnerability has been rated as high severity, affecting versions prior to 4.2.0, and there are currently no reports of this vulnerability being exploited by users.