-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| evm | rust | <= 0.41.0 | 0.41.1 |
The vulnerability stems from incorrect error handling sequence in CREATE/CREATE2 finalization. The original code in cleanup_for_create (impl block for StackExecutor) called exit_substate(StackExitKind::Succeeded) before record_external_operation. This allowed substate commitment before checking for external operation errors, violating atomicity. The patch moves exit_substate after record_external_operation checks, confirming the vulnerable code was in this cleanup path. The file path and implementation context match both vulnerability description and patch changes.
A Semantic Attack on Google Gemini - Read the Latest Research