PyPi: Vyper

CVE-2023-32058

Safety vulnerability ID: 58659

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 11, 2023 Updated at Nov 25, 2024
Scan your Python projects for vulnerabilities →

Advisory

Vyper 0.3.8 includes a fix for CVE-2023-32058: Prior to version 0.3.8, due to missing overflow check for loop variables, by assigning the iterator of a loop to a variable, it is possible to overflow the type of the latter. The issue seems to happen only in loops of type 'for i in range(a, a + N)' as in loops of type 'for i in range(start, stop)' and 'for i in range(stop)', the compiler is able to raise a 'TypeMismatch' when trying to overflow the variable.
https://github.com/vyperlang/vyper/security/advisories/GHSA-6r8q-pfpv-7cgj

Affected package

vyper

Latest version: 0.4.0

Vyper: the Pythonic Programming Language for the EVM

Affected versions

Fixed versions

Vulnerability changelog

Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, due to missing overflow check for loop variables, by assigning the iterator of a loop to a variable, it is possible to overflow the type of the latter. The issue seems to happen only in loops of type `for i in range(a, a + N)` as in loops of type `for i in range(start, stop)` and `for i in range(stop)`, the compiler is able to raise a `TypeMismatch` when trying to overflow the variable. The problem has been patched in version 0.3.8. See CVE-2023-32058.


MISC:https://github.com/vyperlang/vyper/commit/3de1415ee77a9244eb04bdb695e249d3ec9ed868: https://github.com/vyperlang/vyper/commit/3de1415ee77a9244eb04bdb695e249d3ec9ed868
MISC:https://github.com/vyperlang/vyper/security/advisories/GHSA-6r8q-pfpv-7cgj: https://github.com/vyperlang/vyper/security/advisories/GHSA-6r8q-pfpv-7cgj

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH