golang / vulndb

[mirror] The Go Vulnerability Database
Other
554 stars 54 forks source link

x/vulndb: potential Go vuln in github.com/multiversx/mx-chain-go: CVE-2023-33964 #1806

Closed GoVulnBot closed 1 year ago

GoVulnBot commented 1 year ago

CVE-2023-33964 references github.com/multiversx/mx-chain-go, which may be a Go module.

Description: mx-chain-go is an implementation of the MultiversX blockchain protocol written in the Go language. Metachain cannot process a cross-shard miniblock. Prior to version 1.4.16, an invalid transaction with the wrong username on metachain is not treated correctly on the metachain transaction processor. This is strictly a processing issue that could have happened on MultiversX chain. If an error like this had occurred, the metachain would have stopped notarizing blocks from the shard chains. The resuming of notarization is possible only after applying a patched binary version. A patch in version 1.4.16 introduces processIfTxErrorCrossShard for the metachain transaction processor. There are no known workarounds for this issue.

References:

Cross references: No existing reports found with this module or alias.

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: github.com/multiversx/mx-chain-go
    packages:
      - package: mx-chain-go
description: |+
    mx-chain-go is an implementation of the MultiversX blockchain protocol written in the Go language. Metachain cannot process a cross-shard miniblock. Prior to version 1.4.16, an invalid transaction with the wrong username on metachain is not treated correctly on the metachain transaction processor. This is strictly a processing issue that could have happened on MultiversX chain. If an error like this had occurred, the metachain would have stopped notarizing blocks from the shard chains. The resuming of notarization is possible only after applying a patched binary version. A patch in version 1.4.16 introduces `processIfTxErrorCrossShard` for the metachain transaction processor. There are no known workarounds for this issue.

cves:
  - CVE-2023-33964
references:
  - advisory: https://github.com/multiversx/mx-chain-go/security/advisories/GHSA-7xpv-4pm9-xch2
  - fix: https://github.com/multiversx/mx-chain-go/commit/97295471465f4b5f79e51b32f8b7111f8d921606
gopherbot commented 1 year ago

Change https://go.dev/cl/501842 mentions this issue: data/excluded: batch add 15 excluded reports

gopherbot commented 1 month ago

Change https://go.dev/cl/592761 mentions this issue: data/reports: unexclude 75 reports