CVE-2021-41121

Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*

History

02 Aug 2023, 16:22

Type Values Removed Values Added
CPE cpe:2.3:a:vyper_project:vyper:*:*:*:*:*:*:*:* cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*

15 Oct 2021, 15:38

Type Values Removed Values Added
CPE cpe:2.3:a:vyper_project:vyper:*:*:*:*:*:*:*:*
CWE CWE-119
CVSS v2 : unknown
v3 : 7.5
v2 : 6.5
v3 : 8.8
References (CONFIRM) https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv - (CONFIRM) https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv - Third Party Advisory
References (MISC) https://github.com/vyperlang/vyper/pull/2447 - (MISC) https://github.com/vyperlang/vyper/pull/2447 - Patch, Third Party Advisory

06 Oct 2021, 18:39

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-06 18:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-41121

Mitre link : CVE-2021-41121

CVE.ORG link : CVE-2021-41121


JSON object : View

Products Affected

vyperlang

  • vyper
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer