CVE-2020-36402

Solidity 0.7.5 has a stack-use-after-return issue in smtutil::CHCSmtLib2Interface::querySolver. NOTE: c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e is cited in the OSV "fixed" field but does not have a code change.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:soliditylang:solidity:0.7.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

06 Jul 2021, 21:09

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 7.8
CPE cpe:2.3:a:soliditylang:solidity:0.7.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
CWE CWE-787
References (MISC) https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e - (MISC) https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e - Patch, Third Party Advisory
References (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml - (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml - Third Party Advisory
References (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 - (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 - Exploit, Issue Tracking, Patch, Third Party Advisory

01 Jul 2021, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-01 03:15

Updated : 2024-02-04 21:47


NVD link : CVE-2020-36402

Mitre link : CVE-2020-36402

CVE.ORG link : CVE-2020-36402


JSON object : View

Products Affected

soliditylang

  • solidity

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write