Skip to content

Releases: alloy-rs/core

v1.5.7

27 Feb 11:48
e6b30e4

Choose a tag to compare

What's Changed

  • fix(sol-macro): prevent direct String usage in expanded code by @klkvr in #1076
  • chore: release 1.5.7 by @klkvr in #1077

Full Changelog: v1.5.6...v1.5.7

alloy-core v1.5.6

12 Feb 00:02
v1.5.6
0fc5ab4

Choose a tag to compare

What's Changed

Full Changelog: v1.5.5...v1.5.6

alloy-core v1.5.5

11 Feb 21:12
v1.5.5
d913402

Choose a tag to compare

What's Changed

Full Changelog: v1.5.4...v1.5.5

alloy-core v1.5.4

28 Jan 18:48
v1.5.4
6cdba41

Choose a tag to compare

What's Changed

Full Changelog: v1.5.3...v1.5.4

alloy-core v1.5.3

27 Jan 17:23
v1.5.3
5a0a04f

Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v1.5.2...v1.5.3

alloy-core v1.5.2

27 Jan 17:23
v1.5.2
3625aa0

Choose a tag to compare

What's Changed

Full Changelog: v1.5.1...v1.5.2

alloy-core v1.5.1

18 Dec 17:33
v1.5.1
8b96902

Choose a tag to compare

What's Changed

Full Changelog: v1.5.0...v1.5.1

alloy-core v1.5.0

16 Dec 14:35
v1.5.0
09e7503

Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v1.4.1...v1.5.0

alloy-core v1.4.1

14 Oct 14:03
v1.4.1
f7d4a85

Choose a tag to compare

Security

Patched: DoS vulnerability on alloy_dyn_abi::TypedData hashing

An uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service (DoS) via eip712_signing_hash().

Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible.

The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26.

See: GHSA-pgp9-98jm-wwq2

What's Changed

New Contributors

Full Changelog: v1.4.0...v1.4.1

alloy-core v0.8.26

14 Oct 14:03
v0.8.26
79d0ef6

Choose a tag to compare

Security

Patched: DoS vulnerability on alloy_dyn_abi::TypedData hashing

An uncaught panic triggered by malformed input to alloy_dyn_abi::TypedData could lead to a denial-of-service (DoS) via eip712_signing_hash().

Software with high availability requirements such as network services may be particularly impacted. If in use, external auto-restarting mechanisms can partially mitigate the availability issues unless repeated attacks are possible.

The vulnerability was patched by adding a check to ensure the element is not empty before accessing its first element; an error is returned if it is empty. The fix is included in version v1.4.1 and backported to v0.8.26.

See: GHSA-pgp9-98jm-wwq2

Full Changelog: v0.8.25...v0.8.26