CVE-2024-24559

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-24559
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-24559.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-24559
Aliases
Published
2024-02-05T21:04:42.056Z
Modified
2025-11-30T11:29:25.221554Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Vyper SHA3 code generation bug
Details

Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack management when compiling the IR for sha3_64. Concretely, the height variable is miscalculated. The vulnerability can't be triggered without writing the IR by hand (that is, it cannot be triggered from regular vyper code). sha3_64 is used for retrieval in mappings. No flow that would cache the key was found so the issue shouldn't be possible to trigger when compiling the compiler-generated IR. This issue isn't triggered during normal compilation of vyper code so the impact is low. At the time of publication there is no patch available.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/24xxx/CVE-2024-24559.json",
    "cwe_ids": [
        "CWE-327"
    ]
}
References

Affected packages

Git /

Affected ranges