CVE-2022-29255
Summary
| CVE | CVE-2022-29255 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-06-09 09:15:00 UTC |
| Updated | 2023-08-02 16:22:00 UTC |
| Description | Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions prior to 0.3.4 when a calling an external contract with no return value, the contract address (including side effects) could be evaluated twice. This may result in incorrect outcomes for contracts. This issue has been addressed in v0.3.4. |
Risk And Classification
Problem Types: CWE-670
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Vyperlang | Vyper | All | All | All | All |
| Application | Vyper Project | Vyper | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| multiple evaluation of contract address in call · Advisory · vyperlang/vyper · GitHub | CONFIRM | github.com | |
| Merge pull request from GHSA-4v9q-cgpw-cf38 · vyperlang/vyper@6b4d8ff · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.