Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/CosmWasm/wasmvm: GHSA-75qh-gg76-p2w4 #3101

Open
GoVulnBot opened this issue Aug 27, 2024 · 0 comments

Comments

@GoVulnBot
Copy link

Advisory GHSA-75qh-gg76-p2w4 references a vulnerability in the following Go modules:

Module
github.com/CosmWasm/wasmvm

Description:
A specifically crafted Wasm file can cause the VM to consume excessive amounts of memory when compiling a contract.
This can lead to high memory usage, slowdowns, potentially a crash and can poison a lock in the VM,
preventing any further interaction with contracts.

For more information, see CWA-2023-004.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/CosmWasm/wasmvm
      versions:
        - fixed: 1.2.5
        - introduced: 1.3.0
        - fixed: 1.3.1
        - introduced: 1.4.0
        - fixed: 1.4.2
        - introduced: 1.5.0
        - fixed: 1.5.1
      vulnerable_at: 1.5.0
summary: 'CWA-2023-004: Excessive number of function parameters in compiled Wasm in github.com/CosmWasm/wasmvm'
ghsas:
    - GHSA-75qh-gg76-p2w4
references:
    - advisory: https://github.com/advisories/GHSA-75qh-gg76-p2w4
    - web: https://forum.cosmos.network/t/high-severity-security-patch-upcoming-on-wed-10th-cwa-2023-004-brought-to-you-by-certik-and-confio/12840
    - web: https://github.com/CosmWasm/advisories/blob/main/CWAs/CWA-2023-004.md
    - web: https://rustsec.org/advisories/RUSTSEC-2024-0366.html
    - web: https://www.certik.com/resources/blog/risk-and-security-enhancement-for-app-chains-an-in-depth-writeup-of-cwa-2023
source:
    id: GHSA-75qh-gg76-p2w4
    created: 2024-08-27T20:01:18.403801421Z
review_status: UNREVIEWED

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants