Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • Adélie Package Tree Adélie Package Tree
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 309
    • Issues 309
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 21
    • Merge requests 21
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Releases
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • Adélie Linux
  • Adélie Package TreeAdélie Package Tree
  • Issues
  • #353

Closed
Open
Created Sep 04, 2020 by Emily@emily🤖

system/bison: CVE-2020-24240: UAF in _obstack_free

Bugzilla ID 353
Alias(es) CVE-2020-24240
Reporter Max Rees (sroracle)
Assignee Max Rees (sroracle)
Reported 2020-09-04 16:42:29 -0500
Modified 2020-09-22 22:39:10 -0500
Status RESOLVED FIXED
Version 1.0-RC1
Hardware Adélie Linux / All
Importance --- / normal
Package(s) system/bison
URL https://nvd.nist.gov/vuln/detail/CVE-2020-24240

Description

GNU Bison before 3.7.1 has a use-after-free in _obstack_free in
lib/obstack.c (called from gram_lex) when a '\0' byte is encountered.
NOTE: there is a risk only if Bison is used with untrusted input, and
the observed bug happens to cause unsafe behavior with a specific
compiler/architecture. The bug report was intended to show that a
crash may occur in Bison itself, not that a crash may occur in code
that is generated by Bison.

Fixed in >= 3.7.1 https://github.com/akimd/bison/commit/be95a4fe2951374676efc9454ffee8638faaf68d

Edited Feb 02, 2022 by Zach van Rijn
Assignee
Assign to
Time tracking