High severityNVD Advisory· Published Oct 6, 2021· Updated Aug 4, 2024
Memory corruption in Vyper
CVE-2021-41121
Description
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vyperPyPI | < 0.3.0 | 0.3.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-xv8x-pr4h-73jvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-41121ghsaADVISORY
- github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2021-365.yamlghsaWEB
- github.com/vyperlang/vyper/pull/2447ghsax_refsource_MISCWEB
- github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jvghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.