Vulnerability Description
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Starting in version 0.2.9 and prior to version 0.3.10, locks of the type `@nonreentrant("")` or `@nonreentrant('')` do not produce reentrancy checks at runtime. This issue is fixed in version 0.3.10. As a workaround, ensure the lock name is a non-empty string.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vyperlang | Vyper | >= 0.2.9, < 0.3.10 |
Related Weaknesses (CWE)
References
- https://github.com/vyperlang/vyper/commit/0b740280c1e3c5528a20d47b29831948ddcc6dPatch
- https://github.com/vyperlang/vyper/pull/3605Issue TrackingPatch
- https://github.com/vyperlang/vyper/security/advisories/GHSA-3hg2-r75x-g69mExploitPatchVendor Advisory
- https://github.com/vyperlang/vyper/commit/0b740280c1e3c5528a20d47b29831948ddcc6dPatch
- https://github.com/vyperlang/vyper/pull/3605Issue TrackingPatch
- https://github.com/vyperlang/vyper/security/advisories/GHSA-3hg2-r75x-g69mExploitPatchVendor Advisory
FAQ
What is CVE-2023-42441?
CVE-2023-42441 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Starting in version 0.2.9 and prior to version 0.3.10, locks of the type `@nonreentrant("")` or `@nonreentrant('')` ...
How severe is CVE-2023-42441?
CVE-2023-42441 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-42441?
Check the references section above for vendor advisories and patch information. Affected products include: Vyperlang Vyper.