| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/babylonlabs-io/babylon | go | <= 1.0.2 |
The provided commit (f0a29d60f206268b56992fa50f38a48077eb4f59) implements a mitigation by adding an input restriction (the 'bankSendRestrictionOnlyBondDenomToDistribution' function in 'app/keepers/keepers.go'). This restriction prevents certain types of tokens from being sent to the distribution module, thereby indirectly preventing the conditions that lead to the integer overflow. However, this commit does not show the actual code for the 'cumulative_reward_ratio' calculation within the 'x/epoching' module's 'EndBlocker' (where the overflow occurs), nor does it show the handler for the 'DepositValidatorRewardsPool' message (which processes the problematic input). As the task requires identifying vulnerable functions based on the provided patches, and this patch shows a mitigation rather than the vulnerable code itself, I cannot confidently identify the functions that contain the vulnerability or process the malicious input leading directly to the overflow from this specific patch's content.