Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0181 | Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using the built-in `extract32(b, start)`, if the `start` index provided has for side effect to update `b`, the byte array to extract `32` bytes from, it could be that some dirty memory is read and returned by `extract32`. This vulnerability is fixed in 0.4.0. |
Github GHSA |
GHSA-4hwq-4cpm-8vmx | Vyper's `extract32` can ready dirty memory |
Thu, 16 Jan 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:* |
Wed, 09 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vyperlang
Vyperlang vyper |
|
| CPEs | cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vyperlang
Vyperlang vyper |
|
| Metrics |
ssvc
|
Wed, 09 Oct 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using the built-in `extract32(b, start)`, if the `start` index provided has for side effect to update `b`, the byte array to extract `32` bytes from, it could be that some dirty memory is read and returned by `extract32`. This vulnerability affects 0.3.10 and earlier versions. | Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using the built-in `extract32(b, start)`, if the `start` index provided has for side effect to update `b`, the byte array to extract `32` bytes from, it could be that some dirty memory is read and returned by `extract32`. This vulnerability is fixed in 0.4.0. |
| References |
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-25T20:33:03.845Z
Reserved: 2024-01-25T15:09:40.209Z
Link: CVE-2024-24564
Updated: 2024-08-01T23:19:52.913Z
Status : Analyzed
Published: 2024-02-26T20:19:05.627
Modified: 2025-01-16T19:34:13.567
Link: CVE-2024-24564
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA