CVE-2024-32645

Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, incorrect values can be logged when `raw_log` builtin is called with memory or storage arguments to be used as topics. A contract search was performed and no vulnerable contracts were found in production. The `build_IR` function of the `RawLog` class fails to properly unwrap the variables provided as topics. Consequently, incorrect values are logged as topics. As of time of publication, no fixed version is available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

History

02 Jan 2025, 22:52

Type Values Removed Values Added
References () https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3 - () https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3 - Vendor Advisory
CWE NVD-CWE-noinfo
First Time Vyperlang
Vyperlang vyper
CPE cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

Information

Published : 2024-04-25 18:15

Updated : 2025-01-02 22:52


NVD link : CVE-2024-32645

Mitre link : CVE-2024-32645

CVE.ORG link : CVE-2024-32645


JSON object : View

Products Affected

vyperlang

  • vyper
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo