Safety vulnerability ID: 42056
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Vyper version 0.3.0 includes a fix for CVE-2021-41121: In affected versions, when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack.
https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv
https://github.com/vyperlang/vyper/pull/2447
Latest version: 0.4.0
Vyper: the Pythonic Programming Language for the EVM
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0. See CVE-2021-41121.
CONFIRM:https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv: https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv
MISC:https://github.com/vyperlang/vyper/pull/2447: https://github.com/vyperlang/vyper/pull/2447
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application