CVE-2022-39242: Weight not properly refunded after EVM execution
(updated )
Previously, the worst case weight was always accounted as the block weight for all cases. In case of large EVM gas refunds, this can lead to block spamming attacks – the adversary can construct blocks with transactions that have large amount of refunds or unused gases with reverts, and as a result inflate up the chain gas prices. This issue is fixed by properly refund unused weights after each EVM execution.
The impact of this issue is limited in that the spamming attack would still be costly for any adversary, and it has no ability to alter any chain state.
References
Detect and mitigate CVE-2022-39242 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →