Solidity 0.7.5 has a stack-use-after-return issue in smtutil::CHCSmtLib2Interface::querySolver. NOTE: c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e is cited in the OSV "fixed" field but does not have a code change.
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e | Patch Third Party Advisory |
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-06-30 20:15
Updated : 2021-07-06 14:09
NVD link : CVE-2020-36402
Mitre link : CVE-2020-36402
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
soliditylang
- solidity
linux
- linux_kernel