Files
advisory-db/crates/alloy-dyn-abi/RUSTSEC-2025-0073.md

1.5 KiB

[advisory]
id = "RUSTSEC-2025-0073"
package = "alloy-dyn-abi"
date = "2025-10-15"
url = "https://github.com/alloy-rs/core/security/advisories/GHSA-pgp9-98jm-wwq2"
categories = ["denial-of-service"]
cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
keywords = ["uncaught-panic"]
aliases = ["CVE-2025-62370", "GHSA-pgp9-98jm-wwq2"]

[affected.functions]
"alloy_dyn_abi::eip712::Resolver::encode_type" = ["<0.8.26", ">=1.0.0, <1.4.1"]

[versions]
patched = [">=0.8.26, <1.0.0", ">=1.4.1"]

DoS vulnerability on alloy_dyn_abi::TypedData hashing

An uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service (DoS) via eip712_signing_hash().

Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible.

The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26.

There is no known workaround that mitigates the vulnerability. Upgrading to a patched version is the recommended course of action.

Reported by Christian Reitter & Zeke Mostov from Turnkey.