Vulnerability Description
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, incorrect values can be logged when `raw_log` builtin is called with memory or storage arguments to be used as topics. A contract search was performed and no vulnerable contracts were found in production. The `build_IR` function of the `RawLog` class fails to properly unwrap the variables provided as topics. Consequently, incorrect values are logged as topics. As of time of publication, no fixed version is available.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vyperlang | Vyper | < 0.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3Vendor Advisory
- https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3Vendor Advisory
FAQ
What is CVE-2024-32645?
CVE-2024-32645 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, incorrect values can be logged when `raw_log` builtin is called with memory or storage argum...
How severe is CVE-2024-32645?
CVE-2024-32645 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-32645?
Check the references section above for vendor advisories and patch information. Affected products include: Vyperlang Vyper.