Vulnerability Report: GO-2023-2119
- GHSA-7p92-x423-vwj6
- Affects: github.com/consensys/gnark
- Published: Oct 24, 2023
- Modified: May 20, 2024
A a third party may derive a valid proof from a valid initial tuple {proof, public_inputs}, corresponding to the same public inputs as the initial proof. This vulnerability is due to randomness being generated using a small part of the scratch memory describing the state, allowing for degrees of freedom in the transcript. Note that the impact is limited to the PlonK verifier smart contract.
For detailed information about this vulnerability, visit https://github.com/Consensys/gnark/security/advisories/GHSA-7p92-x423-vwj6.
Affected Packages
-
PathGo VersionsSymbols
-
before v0.9.1
-
before v0.9.1
-
before v0.9.1
-
before v0.9.1
-
before v0.9.1
-
before v0.9.1
-
before v0.9.1
Aliases
References
- https://github.com/Consensys/gnark/security/advisories/GHSA-7p92-x423-vwj6
- https://github.com/Consensys/gnark/commit/3421eaa7d544286abf3de8c46282b8d4da6d5da0
- https://vuln.go.dev/ID/GO-2023-2119.json
Feedback
See anything missing or incorrect?
Suggest an edit to this report.