CVE-2023-42441
Published on: Not Yet Published
Last Modified on: 09/21/2023 06:19:00 PM UTC
Certain versions of Vyper from Vyperlang contain the following vulnerability:
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Starting in version 0.2.9 and prior to version 0.3.10, locks of the type `@nonreentrant("")` or `@nonreentrant('')` do not produce reentrancy checks at runtime. This issue is fixed in version 0.3.10. As a workaround, ensure the lock name is a non-empty string.
- CVE-2023-42441 has been assigned by
security-adviso[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
vyperlang - vyper version = >= 0.2.9, < 0.3.10
CVSS3 Score: 5.3 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | LOW | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
incorrect re-entrancy lock when key is empty string · Advisory · vyperlang/vyper · GitHub | github.com text/html |
![]() |
fix: only allow valid identifiers to be nonreentrant keys by charles-cooper · Pull Request #3605 · vyperlang/vyper · GitHub | github.com text/html |
![]() |
fix: only allow valid identifiers to be nonreentrant keys (#3605) · vyperlang/vyper@0b74028 · GitHub | github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Vyperlang | Vyper | All | All | All | All |
- cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*:
No vendor comments have been submitted for this CVE