cve-2022-31111
Vulnerability from cvelistv5
Published
2022-07-06 17:15
Modified
2025-04-23 18:04
Severity ?
EPSS score ?
Summary
Discrepency in transfer value and actual value due to incorrect truncation in Frontier
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/paritytech/frontier/commit/e3e427fa2e5d1200a784679f8015d4774cedc934 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/paritytech/frontier/commit/fed5e0a9577c10bea021721e8c2c5c378e16bf66 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/paritytech/frontier/pull/753 | Issue Tracking, Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/paritytech/frontier/security/advisories/GHSA-hc8w-mx86-9fcj | Patch, Third Party Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
paritytech | frontier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/paritytech/frontier/security/advisories/GHSA-hc8w-mx86-9fcj" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/paritytech/frontier/pull/753" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/paritytech/frontier/commit/e3e427fa2e5d1200a784679f8015d4774cedc934" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/paritytech/frontier/commit/fed5e0a9577c10bea021721e8c2c5c378e16bf66" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-31111", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T15:53:38.617522Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T18:04:45.882Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "frontier", "vendor": "paritytech", "versions": [ { "status": "affected", "version": "commits prior to fed5e0a9577c10bea021721e8c2c5c378e16bf66" } ] } ], "descriptions": [ { "lang": "en", "value": "Frontier is Substrate\u0027s Ethereum compatibility layer. In affected versions the truncation done when converting between EVM balance type and Substrate balance type was incorrectly implemented. This leads to possible discrepancy between appeared EVM transfer value and actual Substrate value transferred. It is recommended that an emergency upgrade to be planned and EVM execution temporarily paused in the mean time. The issue is patched in Frontier master branch commit fed5e0a9577c10bea021721e8c2c5c378e16bf66 and polkadot-v0.9.22 branch commit e3e427fa2e5d1200a784679f8015d4774cedc934. This vulnerability affects only EVM internal states, but not Substrate balance states or node. You can temporarily pause EVM execution (by setting up a Substrate `CallFilter` that disables `pallet-evm` and `pallet-ethereum` calls before the patch can be applied." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-670", "description": "CWE-670: Always-Incorrect Control Flow Implementation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T17:15:14.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/paritytech/frontier/security/advisories/GHSA-hc8w-mx86-9fcj" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/paritytech/frontier/pull/753" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/paritytech/frontier/commit/e3e427fa2e5d1200a784679f8015d4774cedc934" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/paritytech/frontier/commit/fed5e0a9577c10bea021721e8c2c5c378e16bf66" } ], "source": { "advisory": "GHSA-hc8w-mx86-9fcj", "discovery": "UNKNOWN" }, "title": "Discrepency in transfer value and actual value due to incorrect truncation in Frontier", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31111", "STATE": "PUBLIC", "TITLE": "Discrepency in transfer value and actual value due to incorrect truncation in Frontier" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "frontier", "version": { "version_data": [ { "version_value": "commits prior to fed5e0a9577c10bea021721e8c2c5c378e16bf66" } ] } } ] }, "vendor_name": "paritytech" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Frontier is Substrate\u0027s Ethereum compatibility layer. In affected versions the truncation done when converting between EVM balance type and Substrate balance type was incorrectly implemented. This leads to possible discrepancy between appeared EVM transfer value and actual Substrate value transferred. It is recommended that an emergency upgrade to be planned and EVM execution temporarily paused in the mean time. The issue is patched in Frontier master branch commit fed5e0a9577c10bea021721e8c2c5c378e16bf66 and polkadot-v0.9.22 branch commit e3e427fa2e5d1200a784679f8015d4774cedc934. This vulnerability affects only EVM internal states, but not Substrate balance states or node. You can temporarily pause EVM execution (by setting up a Substrate `CallFilter` that disables `pallet-evm` and `pallet-ethereum` calls before the patch can be applied." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-670: Always-Incorrect Control Flow Implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/paritytech/frontier/security/advisories/GHSA-hc8w-mx86-9fcj", "refsource": "CONFIRM", "url": "https://github.com/paritytech/frontier/security/advisories/GHSA-hc8w-mx86-9fcj" }, { "name": "https://github.com/paritytech/frontier/pull/753", "refsource": "MISC", "url": "https://github.com/paritytech/frontier/pull/753" }, { "name": "https://github.com/paritytech/frontier/commit/e3e427fa2e5d1200a784679f8015d4774cedc934", "refsource": "MISC", "url": "https://github.com/paritytech/frontier/commit/e3e427fa2e5d1200a784679f8015d4774cedc934" }, { "name": "https://github.com/paritytech/frontier/commit/fed5e0a9577c10bea021721e8c2c5c378e16bf66", "refsource": "MISC", "url": "https://github.com/paritytech/frontier/commit/fed5e0a9577c10bea021721e8c2c5c378e16bf66" } ] }, "source": { "advisory": "GHSA-hc8w-mx86-9fcj", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31111", "datePublished": "2022-07-06T17:15:14.000Z", "dateReserved": "2022-05-18T00:00:00.000Z", "dateUpdated": "2025-04-23T18:04:45.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-31111\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-07-06T18:15:19.217\",\"lastModified\":\"2022-07-14T14:18:51.873\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Frontier is Substrate\u0027s Ethereum compatibility layer. In affected versions the truncation done when converting between EVM balance type and Substrate balance type was incorrectly implemented. This leads to possible discrepancy between appeared EVM transfer value and actual Substrate value transferred. It is recommended that an emergency upgrade to be planned and EVM execution temporarily paused in the mean time. The issue is patched in Frontier master branch commit fed5e0a9577c10bea021721e8c2c5c378e16bf66 and polkadot-v0.9.22 branch commit e3e427fa2e5d1200a784679f8015d4774cedc934. This vulnerability affects only EVM internal states, but not Substrate balance states or node. You can temporarily pause EVM execution (by setting up a Substrate `CallFilter` that disables `pallet-evm` and `pallet-ethereum` calls before the patch can be applied.\"},{\"lang\":\"es\",\"value\":\"Frontier es la capa de compatibilidad con Ethereum de Substrate. En las versiones afectadas, el truncamiento realizado cuando es convertido entre el tipo de saldo de EVM y el tipo de saldo de Substrate fue implementado de forma incorrecta. Esto conlleva a una posible discrepancia entre el valor de transferencia de EVM aparecido y el valor real de Substrate transferido. Es recomendado planificar una actualizaci\u00f3n de emergencia y detener temporalmente la ejecuci\u00f3n de EVM mientras tanto. El problema est\u00e1 parcheado en el commit de la rama master de Frontier fed5e0a9577c10bea021721e8c2c5c378e16bf66 y en el commit de la rama polkadot-v0.9.22 e3e427fa2e5d1200a784679f8015d4774cedc934. Esta vulnerabilidad afecta s\u00f3lo a estados internos de EVM, pero no a estados de equilibrio del sustrato ni al nodo. Puede detenerse temporalmente la ejecuci\u00f3n de EVM (al configurar un \\\"CallFilter\\\" de Substrate que deshabilite las llamadas \\\"pallet-evm\\\" y \\\"pallet-ethereum\\\" antes de aplicar el parche\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-670\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:parity:frontier:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B181234B-73EA-4932-916B-326F848CE8C6\"}]}]}],\"references\":[{\"url\":\"https://github.com/paritytech/frontier/commit/e3e427fa2e5d1200a784679f8015d4774cedc934\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/paritytech/frontier/commit/fed5e0a9577c10bea021721e8c2c5c378e16bf66\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/paritytech/frontier/pull/753\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/paritytech/frontier/security/advisories/GHSA-hc8w-mx86-9fcj\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.