Always-Incorrect Control Flow Implementation Affecting vyper package, versions [0,0.3.4)
Threat Intelligence
EPSS
0.06% (28th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-VYPER-2859769
- published 7 Jun 2022
- disclosed 6 Jun 2022
- credit Unknown
Introduced: 6 Jun 2022
CVE-2022-29255 Open this link in a new tabHow to fix?
Upgrade vyper
to version 0.3.4 or higher.
Overview
vyper is a Pythonic Smart Contract Language for the EVM.
Affected versions of this package are vulnerable to Always-Incorrect Control Flow Implementation when calling an external contract with no return value. As a result, the contract address will be evaluated twice.
References
CVSS Scores
version 3.1