According to IMEOS, a week ago, Meitu Blockchain Lab discovered a security vulnerability in which a malicious EOS contract could devour user RAM. The lab submitted the issue to EOSIO officials and fully communicated with the official team on the details of the vulnerability. After a week of communication with the official team, the official team has fully understood the harm of the vulnerability and decided to select a suitable solution in the later stage to patch the code of this vulnerability. In order to avoid malicious attacks during this vacuum period, Meitu Blockchain Lab decided to publish the details of the vulnerability for community research reference to facilitate self-inspection and defense. It is reported that EOS contracts can trigger calls to other contracts through require_recipient. Designing such a mechanism provides great convenience to contract developers, but it also brings new problems. When a user transfers money to a contract, the contract can consume the user's RAM without the user's knowledge. |
<<: Why did Google Play Store remove all Bitcoin mining apps?
>>: Report: Number of Crypto Mining Companies in Russia Reaches 75,000
Market, market, everyone is watching the market, ...
As one of the traditional physiognomy techniques, ...
Chinese Bitcoin mining pool ViaBTC has decided to...
Bitcoin’s dilemma. While many crypto assets surge...
A good face is very important because it affects ...
As we all know, facial features are related to de...
As one of the traditional physiognomy techniques, ...
What is the difference between a forked and disco...
On October 29, the "palace co-operation dram...
A normal tree has roots, a trunk, branches and le...
Some Ethereum Classic (ETC) supporters are workin...
It’s been an exciting few weeks for the cryptocur...
Everyone hopes for good fortune and easy money ma...
By Scott Chipolina Odaily Planet Daily Translator...
Moles on the face determine the popularity of the...