CVE-2023-26488: Incorrect Calculation
(updated )
OpenZeppelin Contracts is a library for secure smart contract development. The ERC721Consecutive contract designed for minting NFTs in batches does not update balances when a batch has size 1 and consists of a single token. Subsequent transfers from the receiver of that token may overflow the balance as reported by balanceOf
. The issue exclusively presents with batches of size 1. The issue has been patched in 4.8.2.
References
- github.com/OpenZeppelin/openzeppelin-contracts/commit/167bf67ed3907f4a674043496019fa346cee7705
- github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.8.2
- github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-878m-3g6q-594q
- github.com/advisories/GHSA-878m-3g6q-594q
- nvd.nist.gov/vuln/detail/CVE-2023-26488
Detect and mitigate CVE-2023-26488 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →