ethereum does not check transaction malleability for EIP-2930, EIP-1559 and EIP-7702 transactions
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Jul 2, 2025 
          in
          
            rust-ethereum/ethereum
          
          •
          Updated Jul 2, 2025 
      
  
Description
        Published to the GitHub Advisory Database
      Jul 2, 2025 
    
  
        Reviewed
      Jul 2, 2025 
    
  
        Published by the National Vulnerability Database
      Jul 2, 2025 
    
  
        Last updated
      Jul 2, 2025 
    
  
Impact
Prior to
ethereumcrate v0.18.0, signature malleability (according to EIP-2) was only checked for "legacy" transactions, but not for EIP-2930, EIP-1559 and EIP-7702 transactions.This is a specification deviation and therefore a high severity advisory if the
ethereumcrate is used for Ethereum mainnet. Note that signature malleability itself is not a security issue, and therefore if theethereumcrate is used on a single-implementation blockchain, it's a low/informational severity advisory.Patches
The issue is fixed in
ethereumv0.18.0Workarounds
You can also manually check transaction malleability outside of the crate. But it's recommended to simply upgrade the version.
References
See PR: rust-ethereum/ethereum#67
References