According to IMEOS, a week ago, Meitu Blockchain Lab discovered a security vulnerability in which a malicious EOS contract could devour user RAM. The lab submitted the issue to EOSIO officials and fully communicated with the official team on the details of the vulnerability. After a week of communication with the official team, the official team has fully understood the harm of the vulnerability and decided to select a suitable solution in the later stage to patch the code of this vulnerability. In order to avoid malicious attacks during this vacuum period, Meitu Blockchain Lab decided to publish the details of the vulnerability for community research reference to facilitate self-inspection and defense. It is reported that EOS contracts can trigger calls to other contracts through require_recipient. Designing such a mechanism provides great convenience to contract developers, but it also brings new problems. When a user transfers money to a contract, the contract can consume the user's RAM without the user's knowledge. |
<<: Why did Google Play Store remove all Bitcoin mining apps?
>>: Report: Number of Crypto Mining Companies in Russia Reaches 75,000
The United States Postal Service (USPS) will soon...
Can the weeping husband mole be removed? What is ...
Marriage line with wealthy people A short line fr...
New data shows that despite a 15% drop in the pri...
Facial reactions that lead to company downfall An...
Tianyancha App shows that recently, Beijing Bitma...
In life, we are all afraid of having scars on our...
Loyalty to love Love is very important to everyon...
Crypto markets faced downward pressure at the ope...
Around the New Year, Binance launched multiple Ga...
The 9/11 anniversary just passed. I remember when...
Face reading teaches you how to identify a real f...
In life, moles are common because they exist on e...
Russia's attitude towards Bitcoin has been wa...
We are very familiar with moles. They have certai...