Security Patch
Fixes a denial-of-service vulnerability in RPC endpoints that accept state overrides (e.g. eth_call, debug_traceCall). Crafted stateOverride payloads could cause unbounded memory allocation in storage decoding paths, crashing the node.
Changes
- Bound dynamically-sized storage type lengths to prevent OOM on malicious input
- Reject tampered short-string storage slots with invalid length encoding
- Add clippy lint to prevent reintroduction of unbounded allocations in storage paths
All RPC node operators should upgrade immediately.
Docker image: ghcr.io/tempoxyz/tempo:1.5.1