TonBit has discovered a security vulnerability in the RUNVM instruction of the TON Virtual Machine.

According to the Gate.io News bot, it has been reported that TonBit under BitsLab discovered a non-atomic state migration vulnerability in the RUNVM instruction while performing an in-depth code review of the TON Virtual Machine (TVM). This vulnerability allows attackers to pollute the libraries of the parent virtual machine when the gas of the child virtual machine is exhausted, leading to subsequent calls failing and causing abnormal behavior in contracts that rely on the integrity of the libraries.

TonBit has submitted the relevant technical details and mitigation plans to the TON Foundation and has assisted in completing the vulnerability repair work.

View Original
The content is for reference only, not a solicitation or offer. No investment, tax, or legal advice provided. See Disclaimer for more risks disclosure.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments