Safety vulnerability ID: 49348
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Vyper 0.3.4 includes a fix for CVE-2022-29255: In versions prior to 0.3.4 when a calling an external contract with no return value, the contract address (including side effects) could be evaluated twice. This may result in incorrect outcomes for contracts.
https://github.com/vyperlang/vyper/security/advisories/GHSA-4v9q-cgpw-cf38
Latest version: 0.4.0
Vyper: the Pythonic Programming Language for the EVM
Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions prior to 0.3.4 when a calling an external contract with no return value, the contract address (including side effects) could be evaluated twice. This may result in incorrect outcomes for contracts. This issue has been addressed in v0.3.4. See CVE-2022-29255.
CONFIRM:https://github.com/vyperlang/vyper/security/advisories/GHSA-4v9q-cgpw-cf38: https://github.com/vyperlang/vyper/security/advisories/GHSA-4v9q-cgpw-cf38
MISC:https://github.com/vyperlang/vyper/commit/6b4d8ff185de071252feaa1c319712b2d6577f8d: https://github.com/vyperlang/vyper/commit/6b4d8ff185de071252feaa1c319712b2d6577f8d
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application