You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/postmortems/2021-08-22-split-postmortem.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ On the evening of 17th, we discussed options on how to handle it. We made a stat
56
56
It was decided that in this specific instance, it would be possible to make a public announcement and a patch release:
57
57
58
58
- The fix can be made pretty 'generically', e.g. always copying data on input to precompiles.
59
-
- The flaw is pretty difficult to find, given a generic fix in the call. The attacker needs to figure out that it concerns the precompiles, specifically the datcopy, and that it concerns the `RETURNDATA` buffer rather than the regular memory, and lastly the special circumstances to trigger it (overlapping but shifted input/output).
59
+
- The flaw is pretty difficult to find, given a generic fix in the call. The attacker needs to figure out that it concerns the precompiles, specifically the datacopy, and that it concerns the `RETURNDATA` buffer rather than the regular memory, and lastly the special circumstances to trigger it (overlapping but shifted input/output).
60
60
61
61
Since we had merged the removal of `ETH65`, if the entire network were to upgrade, then nodes which have not yet implemented `ETH66` would be cut off from the network. After further discussions, we decided to:
0 commit comments