CVE-2024-22419: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. The concat
built-in can write over the bounds of the memory buffer that was allocated for it and thus overwrite existing valid data. The root cause is that the build_IR
for concat
does not properly adhere to the API of copy functions (for >=0.3.2
the copy_bytes
function). A contract search was performed and no vulnerable contracts were found in production. The buffer overflow can result in the change of semantics of the contract. The overflow is length-dependent and thus it might go unnoticed during contract testing. However, certainly not all usages of concat will result in overwritten valid data as we require it to be in an internal function and close to the return statement where other memory allocations don’t occur. This issue has been addressed in commit 55e18f6d1
which will be included in future releases. Users are advised to update when possible.
References
Detect and mitigate CVE-2024-22419 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →