From 7e4cbf6107145306ebb5002d66bcb98606a757fe Mon Sep 17 00:00:00 2001 From: Wei Tang Date: Wed, 12 May 2021 03:59:58 +0200 Subject: [PATCH] evm-core: fix crate name (#911) --- crates/{evm => evm-core}/RUSTSEC-2021-0066.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename crates/{evm => evm-core}/RUSTSEC-2021-0066.md (96%) diff --git a/crates/evm/RUSTSEC-2021-0066.md b/crates/evm-core/RUSTSEC-2021-0066.md similarity index 96% rename from crates/evm/RUSTSEC-2021-0066.md rename to crates/evm-core/RUSTSEC-2021-0066.md index ce8bde484..a32caa292 100644 --- a/crates/evm/RUSTSEC-2021-0066.md +++ b/crates/evm-core/RUSTSEC-2021-0066.md @@ -1,7 +1,7 @@ ```toml [advisory] id = "RUSTSEC-2021-0066" -package = "evm" +package = "evm-core" date = "2021-05-11" url = "https://github.com/rust-blockchain/evm" categories = ["denial-of-service"] @@ -13,7 +13,7 @@ patched = [">= 0.26.1", "0.25.1", "0.24.1", "0.23.1", "0.21.1"] # Denial of service on EVM execution due to memory over-allocation Prior to the patch, when executing specific EVM opcodes related -to memory operations that use `evm_core::Memory::copy_large`, the `evm` +to memory operations that use `evm_core::Memory::copy_large`, the crate can over-allocate memory when it is not needed, making it possible for an attacker to perform denial-of-service attack.