Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0.
References
Link | Resource |
---|---|
https://github.com/vyperlang/vyper/pull/2447 | Patch Third Party Advisory |
https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv | Third Party Advisory |
Configurations
History
02 Aug 2023, 16:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:* |
15 Oct 2021, 15:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vyper_project:vyper:*:*:*:*:*:*:*:* | |
CWE | CWE-119 | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
References | (CONFIRM) https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv - Third Party Advisory | |
References | (MISC) https://github.com/vyperlang/vyper/pull/2447 - Patch, Third Party Advisory |
06 Oct 2021, 18:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-06 18:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-41121
Mitre link : CVE-2021-41121
CVE.ORG link : CVE-2021-41121
JSON object : View
Products Affected
vyperlang
- vyper
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer