First published: Wed Oct 06 2021(Updated: )
### Impact When performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. ### Patches 0.3.0 / #2447 *
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vyperlang Vyper | <0.3.0 | |
pip/vyper | <0.3.0 | 0.3.0 |
<0.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-41121.
Vyper is a Pythonic Smart Contract Language for the EVM.
The impact of this vulnerability is a memory corruption issue.
The affected software is Vyperlang Vyper up to version 0.3.0.
To fix this vulnerability, upgrade to version 0.3.0 of Vyperlang Vyper.