PyPi: Vyper

CVE-2023-31146

Safety vulnerability ID: 58658

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 11, 2023 Updated at Nov 25, 2024
Scan your Python projects for vulnerabilities →

Advisory

Vyper 0.3.8 includes a fix for CVE-2023-31146: Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access.
https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv

Affected package

vyper

Latest version: 0.4.0

Vyper: the Pythonic Programming Language for the EVM

Affected versions

Fixed versions

Vulnerability changelog

Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access. Version 0.3.8 contains a patch for this issue. See CVE-2023-31146.


MISC:https://github.com/vyperlang/vyper/commit/4f8289a81206f767df1900ac48f485d90fc87edb: https://github.com/vyperlang/vyper/commit/4f8289a81206f767df1900ac48f485d90fc87edb
MISC:https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv: https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.1

CVSS v3 Details

CRITICAL 9.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH