-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| namada-apps | rust | = 1.0.0 | 1.1.0 |
The vulnerability stems from unvalidated transaction sections during mempool validation(). The primary culprits would be: 1) The mempool validation() entry point that accepts unlimited sections, and 2) The hash computation logic that scales poorly with repeated sections. The lack of section uniqueness checks and count limits in these functions matches the described attack vector of exponential computation growth. Confidence is medium as the exact implementation details aren't available, but the pattern matches common validation vulnerabilities in transaction processing systems.