Solidity 0.7.5 has a stack-use-after-return issue in smtutil::CHCSmtLib2Interface::querySolver. NOTE: c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e is cited in the OSV "fixed" field but does not have a code change.
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e | Patch Third Party Advisory |
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2021-07-01 03:15
Updated : 2024-02-28 18:28
NVD link : CVE-2020-36402
Mitre link : CVE-2020-36402
CVE.ORG link : CVE-2020-36402
JSON object : View
Products Affected
linux
- linux_kernel
soliditylang
- solidity
CWE
CWE-787
Out-of-bounds Write