Vulnerability Description
Rust EVM is an Ethereum Virtual Machine interpreter. In `rust-evm`, a feature called `record_external_operation` was introduced, allowing library users to record custom gas changes. This feature can have some bogus interactions with the call stack. In particular, during finalization of a `CREATE` or `CREATE2`, in the case that the substack execution happens successfully, `rust-evm` will first commit the substate, and then call `record_external_operation(Write(out_code.len()))`. If `record_external_operation` later fails, this error is returned to the parent call stack, instead of `Succeeded`. Yet, the substate commitment already happened. This causes smart contracts able to commit state changes, when the parent caller contract receives zero address (which usually indicates that the execution has failed). This issue only impacts library users with custom `record_external_operation` that returns errors. The issue is patched in release 0.41.1. No known workarounds are available.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Evm Project | Evm | < 0.41.1 |
Related Weaknesses (CWE)
References
- https://github.com/rust-ethereum/evm/blob/release-v041/src/executor/stack/executProduct
- https://github.com/rust-ethereum/evm/commit/d8991ec727ad0fb64fe9957a3cd307387a67Patch
- https://github.com/rust-ethereum/evm/pull/264Patch
- https://github.com/rust-ethereum/evm/security/advisories/GHSA-27wg-99g8-2v4vVendor Advisory
- https://github.com/rust-ethereum/evm/blob/release-v041/src/executor/stack/executProduct
- https://github.com/rust-ethereum/evm/commit/d8991ec727ad0fb64fe9957a3cd307387a67Patch
- https://github.com/rust-ethereum/evm/pull/264Patch
- https://github.com/rust-ethereum/evm/security/advisories/GHSA-27wg-99g8-2v4vVendor Advisory
FAQ
What is CVE-2024-21629?
CVE-2024-21629 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Rust EVM is an Ethereum Virtual Machine interpreter. In `rust-evm`, a feature called `record_external_operation` was introduced, allowing library users to record custom gas changes. This feature can h...
How severe is CVE-2024-21629?
CVE-2024-21629 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-21629?
Check the references section above for vendor advisories and patch information. Affected products include: Evm Project Evm.