@risczero team disclosed a high-risk vulnerability in the zkVM platform, involving a memory safety issue in the sys_read function, which could lead to arbitrary code execution. The vulnerability has been fixed. @risczero 团队在GitHub安全公告中披露了zkVM平台中的高危漏洞,涉及sys_read函数内存安全问题,可能导致任意代码执行,已发布修复版本。
Notes
Vulnerability allows host to write arbitrary code to guest memory via sys_read
All guest programs using affected versions are at risk, breaking zk guarantees
Fix has been applied to risc0-zkvm versions 2.3.2 and 3.0.3, removing unsafe pointer operations
Developers need to update Cargo.toml with related crate versions and rebuild application
RISC Zero proof system and circuits are not affected, no prover action needed
Projects using risc0-aggregation or RiscZeroSetVerifier need to upgrade to >=0.9 version