Prior to the patch, when executing specific EVM opcodes related to memory operations that use evm_core::Memory::copy_large
, the crate can over-allocate memory when it is not needed, making it possible for an attacker to perform denial-of-service attack.
The flaw was corrected in commit 19ade85
. Users should upgrade to ==0.21.1, ==0.23.1, ==0.24.1, ==0.25.1, >=0.26.1
.
None. Please upgrade your evm
crate version
Fix commit: https://github.com/rust-blockchain/evm/commit/19ade858c430ab13eb562764a870ac9f8506f8dd
If you have any questions or comments about this advisory: * Open an issue in evm repo * Email Wei
{ "nvd_published_at": "2021-05-12T18:15:00Z", "cwe_ids": [ "CWE-770", "CWE-787" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-01-30T23:55:38Z" }