CVE-2023-30629
CVSS V2 None
CVSS V3 None
Description
Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions 0.3.1 through 0.3.7, the Vyper compiler generates the wrong bytecode. Any contract that uses the `raw_call` with `revert_on_failure=False` and `max_outsize=0` receives the wrong response from `raw_call`. Depending on the memory garbage, the result can be either `True` or `False`. A patch is available and, as of time of publication, anticipated to be part of Vyper 0.3.8. As a workaround, one may always put `max_outsize>0`.
Overview
- CVE ID
- CVE-2023-30629
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Received
- Published Version
- 2023-04-24T22:15:10
- Last Modified Date
- 2023-04-24T22:15:10
Weakness Enumerations
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-30629 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30629 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-24 23:00:57 | Added to TrackCVE | |||
2023-04-24 23:00:59 | Weakness Enumeration | new |