CVE-2023-41052

Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation of the arguments of the builtin functions `uint256_addmod`, `uint256_mulmod`, `ecadd` and `ecmul` does not follow source order. This behaviour is problematic when the evaluation of one of the arguments produces side effects that other arguments depend on. A patch is currently being developed on pull request #3583. When using builtins from the list above, users should make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*

History

08 Sep 2023, 14:08

Type Values Removed Values Added
CPE cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
First Time Vyperlang vyper
Vyperlang
References (MISC) https://github.com/vyperlang/vyper/pull/3583 - (MISC) https://github.com/vyperlang/vyper/pull/3583 - Patch
References (MISC) https://github.com/vyperlang/vyper/security/advisories/GHSA-4hg4-9mf5-wxxq - (MISC) https://github.com/vyperlang/vyper/security/advisories/GHSA-4hg4-9mf5-wxxq - Exploit, Patch, Third Party Advisory

04 Sep 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-04 18:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-41052

Mitre link : CVE-2023-41052

CVE.ORG link : CVE-2023-41052


JSON object : View

Products Affected

vyperlang

  • vyper
CWE
CWE-670

Always-Incorrect Control Flow Implementation