-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[R4R] security patch from go-ethereum #63
Commits on Jan 11, 2021
-
consensus/ethash: use 64bit indexes for the DAG generation (#21793)
* Bit boundary fix for the DAG generation routine * Fix unnecessary conversion warnings Co-authored-by: Sergey Pavlov <spavlov@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for 2a79ac1 - Browse repository at this point
Copy the full SHA 2a79ac1View commit details -
Configuration menu - View commit details
-
Copy full SHA for 0a64615 - Browse repository at this point
Copy the full SHA 0a64615View commit details -
Configuration menu - View commit details
-
Copy full SHA for ad3ff64 - Browse repository at this point
Copy the full SHA ad3ff64View commit details -
internal/ethapi: fix nil deref + fix estimateGas console bindings (#2…
…1601) * tried to fix * fix for js api * fix for nil pointer ex * rev space * rev space * input call formatter
Configuration menu - View commit details
-
Copy full SHA for d1f95d5 - Browse repository at this point
Copy the full SHA d1f95d5View commit details -
Configuration menu - View commit details
-
Copy full SHA for 4608da6 - Browse repository at this point
Copy the full SHA 4608da6View commit details -
accounts/abi: fix a bug in getTypeSize method (#21501)
* accounts/abi: fix a bug in getTypeSize method e.g. for "Tuple[2]" type, the element of the array is a tuple type and the size of the tuple may not be 32. * accounts/abi: add unit test of getTypeSize method
Configuration menu - View commit details
-
Copy full SHA for 670009d - Browse repository at this point
Copy the full SHA 670009dView commit details -
p2p/enode: avoid crashing for invalid IP (#21981)
The database panicked for invalid IPs. This is usually no problem because all code paths leading to node DB access verify the IP, but it's dangerous because improper validation can turn this panic into a DoS vulnerability. The quick fix here is to just turn database accesses using invalid IP into a noop. This isn't great, but I'm planning to remove the node DB for discv5 long-term, so it should be fine to have this quick fix for half a year. Fixes #21849
Configuration menu - View commit details
-
Copy full SHA for ca1d1cb - Browse repository at this point
Copy the full SHA ca1d1cbView commit details -
p2p/discover: fix deadlock in discv5 message dispatch (#21858)
This fixes a deadlock that could occur when a response packet arrived after a call had already received enough responses and was about to signal completion to the dispatch loop. Co-authored-by: Felix Lange <fjl@twurst.com>
Configuration menu - View commit details
-
Copy full SHA for 9e8ee51 - Browse repository at this point
Copy the full SHA 9e8ee51View commit details