This is a Consensus vulnerability, which can be used to cause a chain-split where vulnerable nodes reject the canonical chain.
Geth’s pre-compiled dataCopy
(at 0x00...04
) contract did a shallow copy on invocation. An attacker could deploy a contract that
X
to an EVM memory region R
,0x00..04
with R
as an argument,R
to Y
,RETURNDATACOPY
opcode.When this contract is invoked, a consensus-compliant node would push X
on the EVM stack, whereas Geth would push Y
.
No standalone patches have been made.
Upgrade to 1.9.17
or higher.
https://blog.ethereum.org/2020/11/12/gethsecurityrelease/
If you have any questions or comments about this advisory: * Open an issue in go-ethereum * Email us at security@ethereum.org
{ "nvd_published_at": null, "cwe_ids": [ "CWE-682" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-05-21T21:51:49Z" }