diff --git a/crates/evm/RUSTSEC-0000-0000.md b/crates/evm/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..dd4c2b5 --- /dev/null +++ b/crates/evm/RUSTSEC-0000-0000.md @@ -0,0 +1,20 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "evm" +date = "2021-05-11" +url = "https://github.com/rust-blockchain/evm" +categories = ["denial-of-service"] + +[versions] +patched = [">= 0.26.1", "0.25.1", "0.24.1", "0.23.1", "0.21.1"] +``` + +# Denial of service on EVM execution due to memory over-allocation + +Prior to the patch, when executing specific EVM opcodes related +to memory operations that use `evm_core::Memory::copy_large`, the `evm` +crate can over-allocate memory when it is not needed, making it +possible for an attacker to perform denial-of-service attack. + +The flaw was corrected in commit `19ade85`. \ No newline at end of file