Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. frontier
  4. ›
  5. CVE-2022-39242

CVE-2022-39242: Weight not properly refunded after EVM execution

September 23, 2022

Previously, the worst case weight was always accounted as the block weight for all cases. In case of large EVM gas refunds, this can lead to block spamming attacks – the adversary can construct blocks with transactions that have large amount of refunds or unused gases with reverts, and as a result inflate up the chain gas prices. This issue is fixed by properly refund unused weights after each EVM execution.

The impact of this issue is limited in that the spamming attack would still be costly for any adversary, and it has no ability to alter any chain state.

References

  • github.com/advisories/GHSA-v57h-6hmh-g2p4
  • github.com/paritytech/frontier
  • github.com/paritytech/frontier/pull/851
  • github.com/paritytech/frontier/security/advisories/GHSA-v57h-6hmh-g2p4
  • nvd.nist.gov/vuln/detail/CVE-2022-39242

Code Behaviors & Features

Detect and mitigate CVE-2022-39242 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.1.0

Solution

Unfortunately, there is no solution available yet.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-682: Incorrect Calculation

Source file

cargo/frontier/CVE-2022-39242.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:57 +0000.