You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Issue found by SRL labs in the semi-automated audit.
Summary
An integer overflow in the oracle pallet can be abused by a malicious oracle.
Issue details
There is an integer overflow inside the oracle::begin_block function which is called upon block initialization. A malicious oracle can trigger this overflow by updating the coin info with high supply and price values via set_updated_coin_infos call inside Pendulum's dia-oracle pallet.
Here is an example call parameters that will trigger the overflow in the next block initialization:
By triggering this integer overflow, a malicious oracle can:
Crash the nodes compiled in debug mode with overflow checks enabled
On nodes which have overflow checks disabled, unexpected behaviors and logic inconsistencies
We assigned a severity of low to this issue since it can only be triggered by permissioned oracles.
Mitigation
Implement proper integer overflow handling by checking call arguments and using safe arithmetic functions.
The text was updated successfully, but these errors were encountered:
Yes, it only would have a higher priority once we decide to let a third party have an authorized account that is allowed to feed price info to our chain. Since it's a security issue we should fix it before this happens. But as long as it's only us feeding the price info, there is no problem.
Context
Issue found by SRL labs in the semi-automated audit.
Summary
An integer overflow in the oracle pallet can be abused by a malicious oracle.
Issue details
There is an integer overflow inside the oracle::begin_block function which is called upon block initialization. A malicious oracle can trigger this overflow by updating the coin info with high supply and price values via set_updated_coin_infos call inside Pendulum's dia-oracle pallet.
Here is an example call parameters that will trigger the overflow in the next block initialization:
Risk
By triggering this integer overflow, a malicious oracle can:
Crash the nodes compiled in debug mode with overflow checks enabled
On nodes which have overflow checks disabled, unexpected behaviors and logic inconsistencies
We assigned a severity of low to this issue since it can only be triggered by permissioned oracles.
Mitigation
Implement proper integer overflow handling by checking call arguments and using safe arithmetic functions.
The text was updated successfully, but these errors were encountered: