CVE-2021-29511

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-29511
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-29511.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-29511
Aliases
Withdrawn
2024-09-03T04:41:08.628948Z
Published
2021-05-12T18:15:08Z
Modified
2024-09-02T22:12:06Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

evm is a pure Rust implementation of Ethereum Virtual Machine. Prior to the patch, when executing specific EVM opcodes related to memory operations that use evm_core::Memory::copy_large, the evm crate can over-allocate memory when it is not needed, making it possible for an attacker to perform denial-of-service attack. The flaw was corrected in commit 19ade85. Users should upgrade to ==0.21.1, ==0.23.1, ==0.24.1, ==0.25.1, >=0.26.1. There are no workarounds. Please upgrade your evm crate version.

References

Affected packages

Git / github.com/rust-ethereum/evm

Affected ranges

Type
GIT
Repo
https://github.com/rust-ethereum/evm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed