Critical PoW vulnerability successfully patched in v4.0.0
Jul 27 2020 ∙ @lehnberg
Prior to the third hard fork, a critical vulnerability was detected in the proof of work verification code of Cuckaroom by @tromp. Had it been exploited, this bug would have led to solution speedups of 1000x and more.
Working with the security team, a fix was introduced without detection in Grin v4.0.0-rc.1, and the entire network successfully upgraded to running fixed software as part of Hard Fork 3 (HF3) on July 16.
It has been verified that this vulnerability was never exploited. No action is required by Grin users or services.
Details of this vulnerability and the events surrounding it can be found in this disclosure document that was published today in the grin-security repo. John’s personal account of the events has also been published in this forum post.