Skip to content

chore(deps): update dependency @openzeppelin/contracts to v5.0.2 [security]#13

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-openzeppelin-contracts-vulnerability
Open

chore(deps): update dependency @openzeppelin/contracts to v5.0.2 [security]#13
renovate[bot] wants to merge 1 commit intomainfrom
renovate/npm-openzeppelin-contracts-vulnerability

Conversation

@renovate
Copy link
Copy Markdown

@renovate renovate Bot commented Aug 8, 2024

This PR contains the following updates:

Package Change Age Confidence
@openzeppelin/contracts (source) 5.0.15.0.2 age confidence

GitHub Vulnerability Alerts

CVE-2024-27094

Impact

The Base64.encode function encodes a bytes input by iterating over it in chunks of 3 bytes. When this input is not a multiple of 3, the last iteration may read parts of the memory that are beyond the input buffer.

Although the encode function pads the output for these cases, up to 4 bits of data are kept between the encoding and padding, corrupting the output if these bits were dirty (i.e. memory after the input is not 0). These conditions are more frequent in the following scenarios:

  • A bytes memory struct is allocated just after the input and the first bytes of it are non-zero.
  • The memory pointer is set to a non-empty memory location before allocating the input.

Developers should evaluate whether the extra bits can be maliciously manipulated by an attacker.

Patches

Upgrade to 5.0.2 or 4.9.6.

References

This issue was reported by the Independent Security Researcher Riley Holterhus through Immunefi (@​rileyholterhus on X)

Severity
  • CVSS Score: 6.5 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

OpenZeppelin Contracts base64 encoding may read from potentially dirty memory

CVE-2024-27094 / GHSA-9vx6-7xxf-x967

More information

Details

Impact

The Base64.encode function encodes a bytes input by iterating over it in chunks of 3 bytes. When this input is not a multiple of 3, the last iteration may read parts of the memory that are beyond the input buffer.

Although the encode function pads the output for these cases, up to 4 bits of data are kept between the encoding and padding, corrupting the output if these bits were dirty (i.e. memory after the input is not 0). These conditions are more frequent in the following scenarios:

  • A bytes memory struct is allocated just after the input and the first bytes of it are non-zero.
  • The memory pointer is set to a non-empty memory location before allocating the input.

Developers should evaluate whether the extra bits can be maliciously manipulated by an attacker.

Patches

Upgrade to 5.0.2 or 4.9.6.

References

This issue was reported by the Independent Security Researcher Riley Holterhus through Immunefi (@​rileyholterhus on X)

Severity

  • CVSS Score: 6.5 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

OpenZeppelin/openzeppelin-contracts (@​openzeppelin/contracts)

v5.0.2

Compare Source

  • Base64: Fix issue where dirty memory located just after the input buffer is affecting the result. (#​4926)

Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot force-pushed the renovate/npm-openzeppelin-contracts-vulnerability branch from 07744c4 to 7a0b1bd Compare January 24, 2025 07:30
@renovate renovate Bot force-pushed the renovate/npm-openzeppelin-contracts-vulnerability branch from 7a0b1bd to 542d4f6 Compare February 1, 2025 03:01
@renovate renovate Bot force-pushed the renovate/npm-openzeppelin-contracts-vulnerability branch from 542d4f6 to 7a9222d Compare April 12, 2025 00:15
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Apr 12, 2025

All alerts resolved. Learn more about Socket for GitHub.

This PR previously contained dependency changes with security issues that have been resolved, removed, or ignored.

View full report

@renovate renovate Bot force-pushed the renovate/npm-openzeppelin-contracts-vulnerability branch from 7a9222d to 00c53fe Compare August 14, 2025 23:12
@renovate renovate Bot changed the title fix(deps): update dependency @openzeppelin/contracts to v5.0.2 [security] chore(deps): update dependency @openzeppelin/contracts to v5.0.2 [security] Sep 26, 2025
…urity]

Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate Bot force-pushed the renovate/npm-openzeppelin-contracts-vulnerability branch from 00c53fe to c8ca83d Compare March 8, 2026 11:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants