脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
soroban-sdk: `Fr` scalar field equality comparison bypasses modular reduction
脆弱性説明
soroban-sdk is a Rust SDK for Soroban contracts. Prior to 22.0.11, 23.5.3, and 25.3.0, The Fr (scalar field) types for BN254 and BLS12-381 in soroban-sdk compared values using their raw U256 representation without first reducing modulo the field modulus r. This caused mathematically equal field elements to compare as not-equal when one or both values were unreduced (i.e., >= r). The vulnerability requires an attacker to supply crafted Fr values through contract inputs, and compare them directly without going through host-side arithmetic operations. Smart contracts that rely on Fr equality checks for security-critical logic could produce incorrect results. The impact depends on how the affected contract uses Fr equality comparisons, but can result in incorrect authorization decisions or validation bypasses in contracts that perform equality checks on user-supplied scalar values. This vulnerability is fixed in 22.0.11, 23.5.3, and 25.3.0.
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
脆弱性タイプ
不充分的比较
脆弱性タイトル
rs-soroban-sdk 安全漏洞
脆弱性説明
rs-soroban-sdk是Stellar开源的一个Rust开发者工具包。 rs-soroban-sdk 22.0.11之前版本、23.5.3之前版本和25.3.0之前版本存在安全漏洞,该漏洞源于BN254和BLS12-381的Fr类型比较值未先进行模约简,可能导致依赖Fr相等性检查的安全关键逻辑产生错误结果,绕过授权决策或验证。
CVSS情報
N/A
脆弱性タイプ
N/A