Safety vulnerability ID: 47973
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Vyper 0.3.2 includes a fix for CVE-2022-24787: In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with "\x00" because there is no comparison of the length.
https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm
Latest version: 0.4.0
Vyper: the Pythonic Programming Language for the EVM
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with `"\x00"` because there is no comparison of the length. A patch is available and expected to be part of the 0.3.2 release. There are currently no known workarounds. See CVE-2022-24787.
CONFIRM:https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm: https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm
MISC:https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508: https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application