CVE-2024-24564
CVSS V2 None
CVSS V3 None
Description
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using the built-in `extract32(b, start)`, if the `start` index provided has for side effect to update `b`, the byte array to extract `32` bytes from, it could be that some dirty memory is read and returned by `extract32`. This vulnerability affects 0.3.10 and earlier versions.
Overview
- CVE ID
- CVE-2024-24564
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-02-26T20:16:13.604Z
- Last Modified Date
- 2024-02-26T20:16:13.604Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx | x_refsource_CONFIRM |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-24564 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24564 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 04:21:36 | Added to TrackCVE |