First published: Mon Aug 01 2022(Updated: )
OpenZeppelin Contracts is a library for secure smart contract development. Contracts using the cross chain utilities for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This issue has been patched in v4.7.2. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenZeppelin Contracts | >=4.6.0<4.7.2 | |
OpenZeppelin Contracts Upgradeable | >=4.6.0<4.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35916 is a vulnerability in OpenZeppelin Contracts library that classifies direct interactions of externally owned accounts (EOAs) as cross chain calls.
OpenZeppelin Contracts versions from 4.6.0 to 4.7.2 and OpenZeppelin Contracts Upgradeable versions from 4.6.0 to 4.7.2 are affected by CVE-2022-35916.
CVE-2022-35916 has a severity score of 5.3, which is considered medium.
To fix CVE-2022-35916, update your OpenZeppelin Contracts library to a version higher than 4.7.2.
More information about CVE-2022-35916 can be found in the OpenZeppelin Contracts GitHub pull request #3578 and the OpenZeppelin Contracts security advisory GHSA-9j3m-g383-29qr.