Vulnerability Description
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, due to missing overflow check for loop variables, by assigning the iterator of a loop to a variable, it is possible to overflow the type of the latter. The issue seems to happen only in loops of type `for i in range(a, a + N)` as in loops of type `for i in range(start, stop)` and `for i in range(stop)`, the compiler is able to raise a `TypeMismatch` when trying to overflow the variable. The problem has been patched in version 0.3.8.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vyperlang | Vyper | < 0.3.8 |
Related Weaknesses (CWE)
References
- https://github.com/vyperlang/vyper/commit/3de1415ee77a9244eb04bdb695e249d3ec9ed8Patch
- https://github.com/vyperlang/vyper/security/advisories/GHSA-6r8q-pfpv-7cgjExploitVendor Advisory
- https://github.com/vyperlang/vyper/commit/3de1415ee77a9244eb04bdb695e249d3ec9ed8Patch
- https://github.com/vyperlang/vyper/security/advisories/GHSA-6r8q-pfpv-7cgjExploitVendor Advisory
FAQ
What is CVE-2023-32058?
CVE-2023-32058 is a vulnerability with a CVSS score of 7.5 (HIGH). Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, due to missing overflow check for loop variables, by assigning the iterator of a loop to a variabl...
How severe is CVE-2023-32058?
CVE-2023-32058 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-32058?
Check the references section above for vendor advisories and patch information. Affected products include: Vyperlang Vyper.