CVE-2024-24559
CVSS V2 None
CVSS V3 None
Description
Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack management when compiling the `IR` for `sha3_64`. Concretely, the `height` variable is miscalculated. The vulnerability can't be triggered without writing the `IR` by hand (that is, it cannot be triggered from regular vyper code). `sha3_64` is used for retrieval in mappings. No flow that would cache the `key` was found so the issue shouldn't be possible to trigger when compiling the compiler-generated `IR`. This issue isn't triggered during normal compilation of vyper code so the impact is low. At the time of publication there is no patch available.
Overview
- CVE ID
- CVE-2024-24559
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-02-05T21:04:42.056Z
- Last Modified Date
- 2024-02-05T21:04:42.056Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/vyperlang/vyper/security/advisories/GHSA-6845-xw22-ffxv | x_refsource_CONFIRM |
https://github.com/vyperlang/vyper/blob/c150fc49ee9375a930d177044559b83cb95f7963/vyper/ir/compile_ir.py#L585-L586 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-24559 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24559 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 04:18:11 | Added to TrackCVE |