CVE-2020-24240
Summary
| CVE | CVE-2020-24240 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-08-25 14:15:00 UTC |
| Updated | 2020-09-02 14:31:00 UTC |
| Description | GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a '\0' byte is encountered. NOTE: there is a risk only if Bison is used with untrusted input, and the observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug report was intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison. |
Risk And Classification
Problem Types: CWE-416
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Comparing v3.7...v3.7.1 · akimd/bison · GitHub | MISC | github.com | Third Party Advisory |
| [bison 3.7] Bug Report | MISC | lists.gnu.org | Mailing List, Vendor Advisory |
| scanner: don't crash on strings containing a NUL byte · akimd/bison@be95a4f · GitHub | MISC | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 501385 Alpine Linux Security Update for bison
- 503070 Alpine Linux Security Update for bison
- 503338 Alpine Linux Security Update for bison
- 503412 Alpine Linux Security Update for bison
- 503501 Alpine Linux Security Update for bison
- 503528 Alpine Linux Security Update for bison
- 503576 Alpine Linux Security Update for bison
- 503613 Alpine Linux Security Update for bison
- 503642 Alpine Linux Security Update for bison
- 503661 Alpine Linux Security Update for bison
- 505856 Alpine Linux Security Update for bison
- 672281 EulerOS Security Update for bison (EulerOS-SA-2022-2674)
- 672297 EulerOS Security Update for bison (EulerOS-SA-2022-2642)