zkvyper is a Vyper compiler. Starting in version 1.3.12 and prior to version 1.5.3, since LLL IR has no Turing-incompletness restrictions, it is compiled to a loop with a much more late exit condition. It leads to a loss of funds or other unwanted behavior if the loop body contains it. However, more real-life use cases like iterating over an array are not affected. No contracts were affected by this issue, which was fixed in version 1.5.3. Upgrading and redeploying affected contracts is the only way to avoid the vulnerability.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Matter-labs zkvyper
|
|
CPEs | cpe:2.3:a:matter-labs:zkvyper:*:*:*:*:*:*:*:* | |
Vendors & Products |
Matter-labs zkvyper
|
Fri, 16 Aug 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Matter-labs
Matter-labs era-compiler-vyper |
|
CPEs | cpe:2.3:a:matter-labs:era-compiler-vyper:*:*:*:*:*:*:*:* | |
Vendors & Products |
Matter-labs
Matter-labs era-compiler-vyper |
|
Metrics |
ssvc
|
Thu, 15 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | zkvyper is a Vyper compiler. Starting in version 1.3.12 and prior to version 1.5.3, since LLL IR has no Turing-incompletness restrictions, it is compiled to a loop with a much more late exit condition. It leads to a loss of funds or other unwanted behavior if the loop body contains it. However, more real-life use cases like iterating over an array are not affected. No contracts were affected by this issue, which was fixed in version 1.5.3. Upgrading and redeploying affected contracts is the only way to avoid the vulnerability. | |
Title | zkvyper ignored loop range bounds | |
Weaknesses | CWE-835 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-08-15T20:11:56.456Z
Updated: 2024-08-16T17:07:16.487Z
Reserved: 2024-08-09T14:23:55.513Z
Link: CVE-2024-43366
Vulnrichment
Updated: 2024-08-16T17:07:10.347Z
NVD
Status : Analyzed
Published: 2024-08-15T21:15:17.520
Modified: 2024-09-27T18:08:11.690
Link: CVE-2024-43366
Redhat
No data.