Security
Patched: DoS vulnerability on alloy_dyn_abi::TypedData
hashing
An uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData
could lead to a denial-of-service (DoS) via eip712_signing_hash()
.
Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible.
The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26.
See: GHSA-pgp9-98jm-wwq2
What's Changed
- chore: remove feature(doc_auto_cfg) by @DaniPopes in #1019
- feat(primitives): Add Borsh support for
TxKind
by @mablr in #1022 - feat: Add Sqlx Traits for
Bytes
Type by @Arvmor in #1020 - chore: fix docs, typos by @DaniPopes in #1023
- feat(sol-macro): add transient storage keyword support by @AurelienFT in #1026
- feat: gate 60 tuple impls behind 'more-tuple-impls' feature flag by @DaniPopes in #1027
- chore: remove some inlines by @DaniPopes in #1028
- refactor(dyn-abi): clean up Resolver by @DaniPopes in #1030
New Contributors
- @AurelienFT made their first contribution in #1026
Full Changelog: v1.4.0...v1.4.1