CVE-2023-31146

critical

Description

Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access. Version 0.3.8 contains a patch for this issue.

References

https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv

https://github.com/vyperlang/vyper/commit/4f8289a81206f767df1900ac48f485d90fc87edb

Details

Source: Mitre, NVD

Published: 2023-05-11

Updated: 2023-08-02

Risk Information

CVSS v2

Base Score: 9.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:C/A:C

Severity: High

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Severity: Critical