logo

CVE-2021-29511 evm

Package

Manager: cargo
Name: evm
Vulnerable Version: >=0 <0.21.1 || =0.22.0 || >=0.22.0 <0.22.1 || =0.23.0 || >=0.23.0 <0.23.1 || =0.24.0 || >=0.24.0 <0.24.1 || =0.25.0 || >=0.25.0 <0.25.1 || =0.26.0 || >=0.26.0 <0.26.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00376 pctl0.58386

Details

Memory over-allocation in evm crate ### Impact Prior to the patch, when executing specific EVM opcodes related to memory operations that use `evm_core::Memory::copy_large`, the crate can over-allocate memory when it is not needed, making it possible for an attacker to perform denial-of-service attack. ### Patches The flaw was corrected in commit `19ade85`. Users should upgrade to `==0.21.1, ==0.23.1, ==0.24.1, ==0.25.1, >=0.26.1`. ### Workarounds None. Please upgrade your `evm` crate version ### References Fix commit: https://github.com/rust-blockchain/evm/commit/19ade858c430ab13eb562764a870ac9f8506f8dd ### For more information If you have any questions or comments about this advisory: * Open an issue in [evm repo](https://github.com/rust-blockchain/evm) * Email [Wei](mailto:wei@that.world)

Metadata

Created: 2024-01-30T23:55:38Z
Modified: 2024-01-30T23:55:38Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-4jwq-572w-4388/GHSA-4jwq-572w-4388.json
CWE IDs: ["CWE-770", "CWE-787"]
Alternative ID: GHSA-4jwq-572w-4388
Finding: F067
Auto approve: 1