Loading HuntDB...

GHSA-4hg4-9mf5-wxxq

GitHub Security Advisory

incorrect order of evaluation of side effects for some builtins

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
The order of evaluation of the arguments of the builtin functions `uint256_addmod`, `uint256_mulmod`, `ecadd` and `ecmul` does not follow source order.
• For `uint256_addmod(a,b,c)` and `uint256_mulmod(a,b,c)`, the order is `c,a,b`.
• For `ecadd(a,b)` and `ecmul(a,b)`, the order is `b,a`.

Note that this behaviour is problematic when the evaluation of one of the arguments produces side effects that other arguments depend on.

### Patches
https://github.com/vyperlang/vyper/pull/3583

### Workarounds
When using builtins from the list above, make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.

### References
_Are there any links users can visit to find out more?_

Affected Packages

PyPI vyper
Affected versions: 0 (fixed in 0.3.10rc1)

Related CVEs

Key Information

GHSA ID
GHSA-4hg4-9mf5-wxxq
Published
September 4, 2023 4:39 PM
Last Modified
November 19, 2024 5:22 PM
CVSS Score
5.0 /10
Primary Ecosystem
PyPI
Primary Package
vyper
GitHub Reviewed
✓ Yes

Dataset

Last updated: June 18, 2025 6:25 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.