CVE-2024-32649

Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `sqrt` builtin can result in double eval vulnerability when the argument has side-effects. It can be seen that the `build_IR` function of the `sqrt` builtin doesn't cache the argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

History

02 Jan 2025, 22:39

Type Values Removed Values Added
CPE cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*
First Time Vyperlang
Vyperlang vyper
References () https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h - () https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h - Vendor Advisory
CWE NVD-CWE-Other

Information

Published : 2024-04-25 18:15

Updated : 2025-01-02 22:39


NVD link : CVE-2024-32649

Mitre link : CVE-2024-32649

CVE.ORG link : CVE-2024-32649


JSON object : View

Products Affected

vyperlang

  • vyper
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

NVD-CWE-Other