Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `slice` builtin can result in a double eval vulnerability when the buffer argument is either `msg.data`, `self.code` or `<address>.code` and either the `start` or `length` arguments have side-effects. It can be easily triggered only with the versions `<0.3.4` as `0.3.4` introduced the unique symbol fence. No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0183 Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `slice` builtin can result in a double eval vulnerability when the buffer argument is either `msg.data`, `self.code` or `<address>.code` and either the `start` or `length` arguments have side-effects. It can be easily triggered only with the versions `<0.3.4` as `0.3.4` introduced the unique symbol fence. No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.\n\n
Github GHSA Github GHSA GHSA-r56x-j438-vw5m vyper performs double eval of the slice start/length args in certain cases
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 02 Jan 2025 23:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T02:13:40.232Z

Reserved: 2024-04-16T14:15:26.875Z

Link: CVE-2024-32646

cve-icon Vulnrichment

Updated: 2024-04-30T16:07:08.261Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-25T18:15:08.780

Modified: 2025-01-02T22:52:15.927

Link: CVE-2024-32646

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.