blob: 3eba8a193cdbfa1aa1d16928afc1bb0cab55cfde [file] [log] [blame]
id: GO-2024-3101
modules:
- module: github.com/CosmWasm/wasmvm
versions:
- fixed: 1.2.5
- introduced: 1.3.0
- fixed: 1.3.1
- introduced: 1.4.0
- fixed: 1.4.2
- introduced: 1.5.0
- fixed: 1.5.1
vulnerable_at: 1.5.0
summary: Excessive number of function parameters in compiled Wasm in github.com/CosmWasm/wasmvm
description: |-
A specifically crafted Wasm file can cause the VM to consume excessive amounts
of memory when compiling a contract. This can lead to high memory usage,
slowdowns, potentially a crash and can poison a lock in the VM, preventing any
further interaction with contracts.
ghsas:
- GHSA-75qh-gg76-p2w4
references:
- advisory: https://github.com/advisories/GHSA-75qh-gg76-p2w4
- web: https://forum.cosmos.network/t/high-severity-security-patch-upcoming-on-wed-10th-cwa-2023-004-brought-to-you-by-certik-and-confio/12840
- web: https://github.com/CosmWasm/advisories/blob/main/CWAs/CWA-2023-004.md
- web: https://rustsec.org/advisories/RUSTSEC-2024-0366.html
- web: https://www.certik.com/resources/blog/risk-and-security-enhancement-for-app-chains-an-in-depth-writeup-of-cwa-2023
notes:
- Could not determine exactly which Go packages are affected, so leaving whole module as affected out of caution.
source:
id: GHSA-75qh-gg76-p2w4
created: 2024-12-20T10:42:53.394291-10:00
review_status: REVIEWED