Skip to content

CVE-2023-42441 | vyper

Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Starting in version 0.2.9 and prior to version 0.3.10, locks of the type `@nonreentrant(“”)` or `@nonreentrant(”)` do not produce reentrancy checks at runtime. This issue is fixed in version 0.3.10. As a workaround, ensure the lock name is a non-empty string..This CVE has a CVSS3.1 score of 5.3 and a Base Severity of MEDIUM.

InfoDetails
CVE IDCVE-2023-42441
CVE StatePUBLISHED
BaseScore5.3
BaseSeverityMEDIUM
VectorStringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
VersionNA

References for CVE-2023-42441 :
https://github.com/vyperlang/vyper/security/advisories/GHSA-3hg2-r75x-g69m
https://github.com/vyperlang/vyper/pull/3605
https://github.com/vyperlang/vyper/commit/0b740280c1e3c5528a20d47b29831948ddcc6d83

Metric TypeMetric Score
AttackVector(AV)NETWORK
AttackComplexity(AC)LOW
PrivilegesRequired(PR)NONE
UserInteraction(UI)NONE
Scope(S)UNCHANGED
Confidentiality(C)NONE
Availability(A)NONE
Integrity(I)LOW