Safety vulnerability ID: 48132
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Vyper 0.3.2 includes a fix for CVE-2022-24788: Versions of Vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns 'bytes' generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun.
https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg
Latest version: 0.4.0
Vyper: the Pythonic Programming Language for the EVM
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. Users are advised to upgrade. There are no known workarounds for this issue. See CVE-2022-24788.
CONFIRM:https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg: https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg
MISC:https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b: https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application