Vulnerability Description
era-compiler-solidity is the ZKsync compiler for Solidity. The problem occurred during instruction selection in the `DAGCombine` phase while visiting the XOR operation. The issue arises when attempting to fold the expression `!(x cc y)` into `(x !cc y)`. To perform this transformation, the second operand of XOR should be a constant representing the true value. However, it was incorrectly assumed that -1 represents the true value, when in fact, 1 is the correct representation, so this transformation for this case should be skipped. This vulnerability is fixed in 1.4.1.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/matter-labs/era-compiler-solidity/security/advisories/GHSA-22
- https://github.com/matter-labs/era-compiler-solidity/security/advisories/GHSA-22
FAQ
What is CVE-2024-34704?
CVE-2024-34704 is a vulnerability with a CVSS score of 5.9 (MEDIUM). era-compiler-solidity is the ZKsync compiler for Solidity. The problem occurred during instruction selection in the `DAGCombine` phase while visiting the XOR operation. The issue arises when attempti...
How severe is CVE-2024-34704?
CVE-2024-34704 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-34704?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.