CVE-2024-21629
Rust vulnerability analysis and mitigation

Overview

Rust EVM, an Ethereum Virtual Machine interpreter, contains a vulnerability in versions <= 0.41.0 related to the record_external_operation feature. This feature, which allows library users to record custom gas changes, was found to have problematic interactions with the call stack during the finalization of CREATE or CREATE2 operations. The vulnerability was discovered and disclosed on January 2, 2024, and has been assigned CVE-2024-21629 (NVD, GitHub Advisory).

Technical details

During the finalization of CREATE or CREATE2 operations, when substack execution succeeds, the implementation first commits the substate and then calls record_external_operation(Write(out_code.len())). If record_external_operation subsequently fails, the error is incorrectly propagated to the parent call stack instead of returning 'Succeeded', despite the substate commitment having already occurred. The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (Medium) with vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N (GitHub Advisory).

Impact

The vulnerability allows smart contracts to commit state changes even when the parent caller contract receives a zero address, which typically indicates execution failure. This behavior could lead to unexpected state changes in the blockchain. The impact is limited to library users who implement custom record_external_operation functions that return errors (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.41.1 of Rust EVM. Users should upgrade to this version or later to address the issue. No alternative workarounds are available (GitHub Advisory, GitHub PR).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22700HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22705MEDIUM6.4
  • RustRust
  • ml-dsa
NoYesJan 10, 2026
CVE-2025-15504MEDIUM4.8
  • PythonPython
  • lief
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management