Solidity 0.7.5 has a stack-use-after-return issue in smtutil::CHCSmtLib2Interface::querySolver. NOTE: c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e is cited in the OSV "fixed" field but does not have a code change.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e | Patch Third Party Advisory | 
| https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml | Third Party Advisory | 
| https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e | Patch Third Party Advisory | 
| https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 05:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | () https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e - Patch, Third Party Advisory | |
| References | () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml - Third Party Advisory | 
06 Jul 2021, 21:09
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 6.8 v3 : 7.8 | 
| CPE | cpe:2.3:a:soliditylang:solidity:0.7.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
| CWE | CWE-787 | |
| References | (MISC) https://github.com/ethereum/solidity/commit/c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e - Patch, Third Party Advisory | |
| References | (MISC) https://github.com/google/oss-fuzz-vulns/blob/main/vulns/solidity/OSV-2020-2131.yaml - Third Party Advisory | |
| References | (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26997 - Exploit, Issue Tracking, Patch, Third Party Advisory | 
01 Jul 2021, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-07-01 03:15
Updated : 2024-11-21 05:29
NVD link : CVE-2020-36402
Mitre link : CVE-2020-36402
CVE.ORG link : CVE-2020-36402
JSON object : View
Products Affected
                soliditylang
- solidity
linux
- linux_kernel
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
