Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Starting in version 0.2.9 and prior to version 0.3.10, locks of the type `@nonreentrant(“”)` or `@nonreentrant(”)` do not produce reentrancy checks at runtime. This issue is fixed in version 0.3.10. As a workaround, ensure the lock name is a non-empty string..This CVE has a CVSS3.1 score of 5.3 and a Base Severity of MEDIUM.
Info | Details |
---|---|
CVE ID | CVE-2023-42441 |
CVE State | PUBLISHED |
BaseScore | 5.3 |
BaseSeverity | MEDIUM |
VectorString | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
Version | NA |
References for CVE-2023-42441 :
https://github.com/vyperlang/vyper/security/advisories/GHSA-3hg2-r75x-g69m
https://github.com/vyperlang/vyper/pull/3605
https://github.com/vyperlang/vyper/commit/0b740280c1e3c5528a20d47b29831948ddcc6d83
Metric Type | Metric Score |
---|---|
AttackVector(AV) | NETWORK |
AttackComplexity(AC) | LOW |
PrivilegesRequired(PR) | NONE |
UserInteraction(UI) | NONE |
Scope(S) | UNCHANGED |
Confidentiality(C) | NONE |
Availability(A) | NONE |
Integrity(I) | LOW |