You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As observed in #659 , Share struct contains two copies of payload data: one in Share::evals and another in Share::evals_proof. The copy in Share::evals_proof is checked against its merkle path here:
All subsequent verification is done against Share::evals. Currently we do not check that these two copies are equal, so there's a potential security vulnerability. This issue could be fixed by checking that these two copies are equal. But a far better solution is to eliminate the duplicate copy as suggested in #659. Presumably, any fix for #659 will also fix this issue.
[EDIT: Kudos to @akonring for noticing this potential vulnerability.]
The text was updated successfully, but these errors were encountered:
As observed in #659 ,
Share
struct contains two copies of payload data: one inShare::evals
and another inShare::evals_proof
. The copy inShare::evals_proof
is checked against its merkle path here:jellyfish/vid/src/advz.rs
Lines 536 to 542 in 92714a4
All subsequent verification is done against
Share::evals
. Currently we do not check that these two copies are equal, so there's a potential security vulnerability. This issue could be fixed by checking that these two copies are equal. But a far better solution is to eliminate the duplicate copy as suggested in #659. Presumably, any fix for #659 will also fix this issue.[EDIT: Kudos to @akonring for noticing this potential vulnerability.]
The text was updated successfully, but these errors were encountered: