CVE-2023-31146

HIGH

Vyper <0.3.8 - Memory Corruption

Title source: llm
STIX 2.1

Description

Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access. Version 0.3.8 contains a patch for this issue.

Scores

CVSS v3 7.5
EPSS 0.0022
EPSS Percentile 44.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-787
Status published
Products (2)
pypi/vyper 0 - 0.3.8PyPI
vyperlang/vyper < 0.3.8
Published May 11, 2023
Tracked Since Feb 18, 2026