mirror of
https://github.com/rustsec/advisory-db.git
synced 2025-12-27 01:54:07 -05:00
fix: RUSTSEC-2025-0073 (alloy-dyn-abi), update to description and credit (#2423)
This commit is contained in:
@@ -18,10 +18,12 @@ patched = [">=0.8.26, <1.0.0", ">=1.4.1"]
|
||||
|
||||
# DoS vulnerability on `alloy_dyn_abi::TypedData` hashing
|
||||
|
||||
An uncaught panic triggered by malformed input to `alloy_dyn_abi::TypedData` could lead to a denial-of-service (DoS) when the library is used in auto-restarting software.
|
||||
An uncaught panic triggered by malformed input to `alloy_dyn_abi::TypedData` could lead to a denial-of-service (DoS) via `eip712_signing_hash()`.
|
||||
|
||||
Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible.
|
||||
|
||||
The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version [v1.4.1](https://crates.io/crates/alloy-dyn-abi/1.4.1) and backported to [v0.8.26](https://crates.io/crates/alloy-dyn-abi/0.8.26).
|
||||
|
||||
There is no known workaround that mitigates the vulnerability. Upgrading to a patched version is the recommended course of action.
|
||||
|
||||
Reported by [Christian Reitter](https://github.com/cr-tk) & [Zeke Mostov](https://github.com/emostov).
|
||||
Reported by [Christian Reitter](https://github.com/cr-tk) & [Zeke Mostov](https://github.com/emostov) from [Turnkey](https://www.turnkey.com/).
|
||||
|
||||
Reference in New Issue
Block a user