Ethermint is an Ethereum library. In Ethermint running versions before `v0.17.2`, the contract `selfdestruct` invocation permanently removes the corresponding bytecode from the internal database storage. However, due to a bug in the `DeleteAccount`function, all contracts that used the identical bytecode (i.e shared the same `CodeHash`) will also stop working once one contract invokes `selfdestruct`, even though the other contracts did not invoke the `selfdestruct` OPCODE. This vulnerability has been patched in Ethermint version v0.18.0. The patch has state machine-breaking changes for applications using Ethermint, so a coordinated upgrade procedure is required. A workaround is available. If a contract is subject to DoS due to this issue, the user can redeploy the same contract, i.e. with identical bytecode, so that the original contract's code is recovered. The new contract deployment restores the `bytecode hash -> bytecode` entry in the internal state.
References
Link | Resource |
---|---|
https://github.com/evmos/ethermint/blob/c9d42d667b753147977a725e98ed116c933c76cb/x/evm/keeper/statedb.go#L199-L203 | Exploit Third Party Advisory |
https://github.com/evmos/ethermint/commit/144741832007a26dbe950512acbda4ed95b2a451 | Patch Third Party Advisory |
https://github.com/evmos/ethermint/security/advisories/GHSA-f92v-grc2-w2fg | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-08-05T12:55:11
Updated: 2022-08-05T12:55:11
Reserved: 2022-07-15T00:00:00
Link: CVE-2022-35936
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-08-05T13:15:08.137
Modified: 2022-08-13T00:59:12.273
Link: CVE-2022-35936
JSON object: View
Redhat Information
No data.
CWE