What kind of vulnerability is it? Who is impacted?
An attacker can use this bug to bypass the block gas limit and gas payment completely to perform a full Denial-of-Service against the chain.
Evmos versions below v11.0.1
do not check for MsgEthereumTx
messages that are nested under other messages. This allows a malicious actor to perform EVM transactions that do not meet the checks performed under newEthAnteHandler
. This opens the possibility for the DOS of validators and consequently halt the chain through an infinite EVM execution.
The attack scenario is as follows:
uint64
max or similar). All Evmos users are impacted by this vulnerability as it has the potential to halt the chain. Users' funds and chain state are safe but when under attack, the chain could be deemed unusable.
Has the problem been patched? What versions should users upgrade to?
The vulnerability has been patched on Evmos versions ≥v12.0.0.
As a temporary workaround, the fix blocks MsgEthereumTxs
messages from being sent under the authz
module's MsgExec
message. It also covers the scenario in which MsgEthereumTx
are deeply nested by:
MsgExec
MsgExec
This is done by adding an additional AnteHandler
decorator (AuthzLimiterDecorator
) for Cosmos and EIP-712 transactions.
This is a state machine-breaking change as it restricts previously allowed messages and thus requires a hard-fork upgrade.
Are there any links users can visit to find out more?
If you have any questions or comments about this advisory:
{ "nvd_published_at": null, "cwe_ids": [], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2024-04-17T17:35:21Z" }