![warn](/_next/image?url=%2Fhome%2Fwarn.png&w=128&q=75)
CVE-2024-24564
- Reference to the description:
- Description:
- Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using the built-in `extract32(b, start)`, if the `start` index provided has for side effect to update `b`, the byte array to extract `32` bytes from, it could be that some dirty memory is read and returned by `extract32`. This vulnerability is fixed in 0.4.0.
- Last updated date:
- 01/16/2025
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/16/2025
- Reference url to background
https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx