Vulnerability Report: GO-2024-3101
- GHSA-75qh-gg76-p2w4
- Affects: github.com/CosmWasm/wasmvm
- Published: Dec 20, 2024
- Modified: Dec 20, 2024
A specifically crafted Wasm file can cause the VM to consume excessive amounts of memory when compiling a contract. This can lead to high memory usage, slowdowns, potentially a crash and can poison a lock in the VM, preventing any further interaction with contracts.
For detailed information about this vulnerability, visit https://github.com/advisories/GHSA-75qh-gg76-p2w4.
Affected Modules
-
PathGo Versions
-
before v1.2.5, from v1.3.0 before v1.3.1, from v1.4.0 before v1.4.2, from v1.5.0 before v1.5.1
Aliases
References
- https://github.com/advisories/GHSA-75qh-gg76-p2w4
- https://forum.cosmos.network/t/high-severity-security-patch-upcoming-on-wed-10th-cwa-2023-004-brought-to-you-by-certik-and-confio/12840
- https://github.com/CosmWasm/advisories/blob/main/CWAs/CWA-2023-004.md
- https://rustsec.org/advisories/RUSTSEC-2024-0366.html
- https://www.certik.com/resources/blog/risk-and-security-enhancement-for-app-chains-an-in-depth-writeup-of-cwa-2023
- https://vuln.go.dev/ID/GO-2024-3101.json
Feedback
See anything missing or incorrect?
Suggest an edit to this report.