Safety vulnerability ID: 58658
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Vyper 0.3.8 includes a fix for CVE-2023-31146: Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access.
https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv
Latest version: 0.4.0
Vyper: the Pythonic Programming Language for the EVM
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access. Version 0.3.8 contains a patch for this issue. See CVE-2023-31146.
MISC:https://github.com/vyperlang/vyper/commit/4f8289a81206f767df1900ac48f485d90fc87edb: https://github.com/vyperlang/vyper/commit/4f8289a81206f767df1900ac48f485d90fc87edb
MISC:https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv: https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application