First published: Wed Apr 13 2022(Updated: )
### Impact Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. ### Patches 0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b) ### Workarounds Use .vy interfaces.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vyperlang Vyper | <0.3.2 | |
pip/vyper | <0.3.2 | 0.3.2 |
<0.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24788 is a vulnerability in the Vyper smart contract language for the Ethereum Virtual Machine (EVM).
CVE-2022-24788 can potentially result in a buffer overrun when importing a function from a JSON interface in Vyper versions prior to 0.3.2.
Exploiting CVE-2022-24788 could allow an attacker to perform arbitrary code execution or cause a denial-of-service (DoS) condition.
To fix CVE-2022-24788, update Vyper to version 0.3.2 or later.
CVE-2022-24788 has a severity rating of 9.8, which is classified as critical.