CVE-2020-36402

Solidity 0.7.5 has a stack-use-after-return issue in smtutil::CHCSmtLib2Interface::querySolver. NOTE: c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e is cited in the OSV "fixed" field but does not have a code change.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:soliditylang:solidity:0.7.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:29

Type Values Removed Values Added
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e - Patch, Third Party Advisory () https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e - Patch, Third Party Advisory
References () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml - Third Party Advisory () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml - Third Party Advisory

Information

Published : 2021-07-01 03:15

Updated : 2024-11-21 05:29


NVD link : CVE-2020-36402

Mitre link : CVE-2020-36402

CVE.ORG link : CVE-2020-36402


JSON object : View

Products Affected

linux

  • linux_kernel

soliditylang

  • solidity
CWE
CWE-787

Out-of-bounds Write