x/vulndb: potential Go vuln in github.com/ethereum/go-ethereum/core/vm: GHSA-69v6-xc2j-r2jf · Issue #1332 · golang/vulndb · GitHub
More Web Proxy on the site http://driver.im/
You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See doc/triage.md for instructions on how to triage this report.
modules:
- module: TODO
versions:
- fixed: 1.19.7
packages:
- package: github.com/ethereum/go-ethereum/core/vm
- module: TODO
versions:
- introduced: 1.9.7
fixed: 1.9.17
packages:
- package: github.com/ethereum/go-ethereum
description: "### Impact\nThis is a Consensus vulnerability, which can be used to
cause a chain-split where vulnerable nodes reject the canonical chain. \n\nGeth’s
pre-compiled `dataCopy` (at `0x00...04`) contract did a shallow copy on invocation.
An attacker could deploy a contract that \n\n- writes `X` to an EVM memory region
`R`,\n- calls `0x00..04` with `R` as an argument,\n- overwrites `R` to `Y`,\n-
and finally invokes the `RETURNDATACOPY` opcode.\n\nWhen this contract is invoked,
a consensus-compliant node would push `X` on the EVM stack, whereas Geth would
push `Y`.\n\n### For more information\nIf you have any questions or comments about
this advisory:\n* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)\n*
Email us at [security@ethereum.org](mailto:security@ethereum.org)"
cves:
- CVE-2020-26241
ghsas:
- GHSA-69v6-xc2j-r2jf
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-69v6-xc2j-r2jf, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: