We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-41153

Specification non-compliance in JUMPI



AssignerGitHub_M
Reserved2021-09-15
Published2021-10-18
Updated2024-08-04

Description

The evm crate is a pure Rust implementation of Ethereum Virtual Machine. In `evm` crate `< 0.31.0`, `JUMPI` opcode's condition is checked after the destination validity check. However, according to Geth and OpenEthereum, the condition check should happen before the destination validity check. This is a **high** severity security advisory if you use `evm` crate for Ethereum mainnet. In this case, you should update your library dependency immediately to on or after `0.31.0`. This is a **low** severity security advisory if you use `evm` crate in Frontier or in a standalone blockchain, because there's no security exploit possible with this advisory. It is **not** recommended to update to on or after `0.31.0` until all the normal chain upgrade preparations have been done. If you use Frontier or other `pallet-evm` based Substrate blockchain, please ensure to update your `spec_version` before updating this. For other blockchains, please make sure to follow a hard-fork process before you update this.



HIGH: 8.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N

Problem types

CWE-670: Always-Incorrect Control Flow Implementation

Product status

< 0.31.0
affected

References

https://github.com/rust-blockchain/evm/security/advisories/GHSA-pvh2-pj76-4m96

https://github.com/rust-blockchain/evm/pull/67

cve.org CVE-2021-41153

nvd.nist.gov CVE-2021-41153

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.