Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/crypto-org-chain/cronos: CVE-2021-43839 #283

Closed
GoVulnBot opened this issue Feb 4, 2022 · 0 comments
Labels
excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable.

Comments

@GoVulnBot
Copy link

In CVE-2021-43839, the reference URL github.com/crypto-org-chain/cronos (and possibly others) refers to something in Go.

module: github.com/crypto-org-chain/cronos
package: cronos
description: |
    Cronos is a commercial implementation of a blockchain. In Cronos nodes running versions before v0.6.5, it is possible to take transaction fees from Cosmos SDK's FeeCollector for the current block by sending a custom crafted MsgEthereumTx. This problem has been patched in Cronos v0.6.5. There are no tested workarounds. All validator node operators are recommended to upgrade to Cronos v0.6.5 at their earliest possible convenience.
cves:
  - CVE-2021-43839
links:
    pr: https://github.com/crypto-org-chain/cronos/pull/270
    commit: https://github.com/crypto-org-chain/cronos/commit/150ef237b37ac28c8136e1c0f494932860b9ebe8
    context:
      - https://github.com/crypto-org-chain/cronos/security/advisories/GHSA-f854-hpxv-cw9r

See doc/triage.md for instructions on how to triage this report.

@neild neild added excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable. and removed NotGoVuln labels Aug 11, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable.
Projects
None yet
Development

No branches or pull requests

3 participants