PyPi: Vyper

CVE-2022-24787

Safety vulnerability ID: 47973

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Apr 04, 2022 Updated at May 16, 2024
Scan your Python projects for vulnerabilities →

Advisory

Vyper 0.3.2 includes a fix for CVE-2022-24787: In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with "\x00" because there is no comparison of the length.
https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm

Affected package

vyper

Latest version: 0.3.10

Vyper: the Pythonic Programming Language for the EVM

Affected versions

Fixed versions

Vulnerability changelog

Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with `"\x00"` because there is no comparison of the length. A patch is available and expected to be part of the 0.3.2 release. There are currently no known workarounds. See CVE-2022-24787.


CONFIRM:https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm: https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm
MISC:https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508: https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
HIGH
Availability Availability (A)
NONE

CVSS v2 Details

MEDIUM 5.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
NONE