Vulnerability Details CVE-2024-24559
Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack management when compiling the `IR` for `sha3_64`. Concretely, the `height` variable is miscalculated. The vulnerability can't be triggered without writing the `IR` by hand (that is, it cannot be triggered from regular vyper code). `sha3_64` is used for retrieval in mappings. No flow that would cache the `key` was found so the issue shouldn't be possible to trigger when compiling the compiler-generated `IR`. This issue isn't triggered during normal compilation of vyper code so the impact is low. At the time of publication there is no patch available.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.0%
CVSS Severity
CVSS v3 Score 3.7
Products affected by CVE-2024-24559
-
cpe:2.3:a:vyperlang:vyper:0.0.4
-
cpe:2.3:a:vyperlang:vyper:0.1.0
-
cpe:2.3:a:vyperlang:vyper:0.2.0
-
cpe:2.3:a:vyperlang:vyper:0.2.1
-
cpe:2.3:a:vyperlang:vyper:0.2.10
-
cpe:2.3:a:vyperlang:vyper:0.2.11
-
cpe:2.3:a:vyperlang:vyper:0.2.12
-
cpe:2.3:a:vyperlang:vyper:0.2.13
-
cpe:2.3:a:vyperlang:vyper:0.2.14
-
cpe:2.3:a:vyperlang:vyper:0.2.15
-
cpe:2.3:a:vyperlang:vyper:0.2.16
-
cpe:2.3:a:vyperlang:vyper:0.2.2
-
cpe:2.3:a:vyperlang:vyper:0.2.3
-
cpe:2.3:a:vyperlang:vyper:0.2.4
-
cpe:2.3:a:vyperlang:vyper:0.2.5
-
cpe:2.3:a:vyperlang:vyper:0.2.6
-
cpe:2.3:a:vyperlang:vyper:0.2.7
-
cpe:2.3:a:vyperlang:vyper:0.2.8
-
cpe:2.3:a:vyperlang:vyper:0.2.9
-
cpe:2.3:a:vyperlang:vyper:0.3.0
-
cpe:2.3:a:vyperlang:vyper:0.3.1
-
cpe:2.3:a:vyperlang:vyper:0.3.10
-
cpe:2.3:a:vyperlang:vyper:0.3.2
-
cpe:2.3:a:vyperlang:vyper:0.3.3
-
cpe:2.3:a:vyperlang:vyper:0.3.4
-
cpe:2.3:a:vyperlang:vyper:0.3.5
-
cpe:2.3:a:vyperlang:vyper:0.3.6
-
cpe:2.3:a:vyperlang:vyper:0.3.7
-
cpe:2.3:a:vyperlang:vyper:0.3.8
-
cpe:2.3:a:vyperlang:vyper:0.3.9