CVE-2024-32649

Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `sqrt` builtin can result in double eval vulnerability when the argument has side-effects. It can be seen that the `build_IR` function of the `sqrt` builtin doesn't cache the argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

History

02 Jan 2025, 22:39

Type Values Removed Values Added
First Time Vyperlang vyper
Vyperlang
CPE cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*
CWE NVD-CWE-Other
References () https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h - () https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

25 Apr 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-25 18:15

Updated : 2025-01-02 22:39


NVD link : CVE-2024-32649

Mitre link : CVE-2024-32649


JSON object : View

Products Affected

vyperlang

  • vyper