PyPi: Vyper

CVE-2022-24788

Safety vulnerability ID: 48132

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Apr 13, 2022 Updated at May 16, 2024
Scan your Python projects for vulnerabilities →

Advisory

Vyper 0.3.2 includes a fix for CVE-2022-24788: Versions of Vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns 'bytes' generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun.
https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg

Affected package

vyper

Latest version: 0.3.10

Vyper: the Pythonic Programming Language for the EVM

Affected versions

Fixed versions

Vulnerability changelog

Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. Users are advised to upgrade. There are no known workarounds for this issue. See CVE-2022-24788.


CONFIRM:https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg: https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg
MISC:https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b: https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

CRITICAL 9.8

CVSS v3 Details

CRITICAL 9.8
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH

CVSS v2 Details

HIGH 7.5
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
PARTIAL
Availability Impact (A)
PARTIAL