logo

CVE-2022-39242 pallet-ethereum

Package

Manager: cargo
Name: pallet-ethereum
Vulnerable Version: >=0 <=3.0.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00063 pctl0.19907

Details

Weight not properly refunded after EVM execution ### Impact Previously, the worst case weight was always accounted as the block weight for all cases. In case of large EVM gas refunds, this can lead to block spamming attacks -- the adversary can construct blocks with transactions that have large amount of refunds or unused gases with reverts, and as a result inflate up the chain gas prices. This issue is fixed by properly refund unused weights after each EVM execution. The impact of this issue is limited in that the spamming attack would still be costly for any adversary, and it has no ability to alter any chain state. ### Patches The issue is fixed in https://github.com/paritytech/frontier/pull/851 ### Workarounds None. ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [Frontier repo](https://github.com/paritytech/frontier/issues) * Email [Wei](mailto:wei@that.world)

Metadata

Created: 2022-09-23T22:07:10Z
Modified: 2024-10-24T21:55:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-v57h-6hmh-g2p4/GHSA-v57h-6hmh-g2p4.json
CWE IDs: ["CWE-682"]
Alternative ID: GHSA-v57h-6hmh-g2p4
Finding: F138
Auto approve: 1