Prior to the patch, when executing specific EVM opcodes related to memory operations that use evm_core::Memory::copy_large, the crate can over-allocate memory when it is not needed, making it possible for an attacker to perform denial-of-service attack.
The flaw was corrected in commit 19ade85. Users should upgrade to ==0.21.1, ==0.23.1, ==0.24.1, ==0.25.1, >=0.26.1.
None. Please upgrade your evm crate version
Fix commit: https://github.com/rust-blockchain/evm/commit/19ade858c430ab13eb562764a870ac9f8506f8dd
If you have any questions or comments about this advisory: * Open an issue in evm repo * Email Wei
{
"nvd_published_at": "2021-05-12T18:15:00Z",
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-770",
"CWE-787"
],
"github_reviewed_at": "2024-01-30T23:55:38Z"
}