An update for bison is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP3 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1767 Final 1.0 1.0 2022-07-22 Initial 2022-07-22 2022-07-22 openEuler SA Tool V1.0 2022-07-22 bison security update An update for bison is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP3. Bison is a general-purpose parser generator that converts an annotated context-free grammar into a deterministic LR or generalized LR (GLR) parser employing LALR(1) parser tables. As an experimental feature, Bison can also generate IELR(1) or canonical LR(1) parser tables. Once you are proficient with Bison, you can use it to develop a wide range of language parsers, from those used in simple desk calculators to complex programming languages. Security Fix(es): GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a '\0' byte is encountered. NOTE: there is a risk only if Bison is used with untrusted input, and the observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug report was intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison.(CVE-2020-24240) An update for bison is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP3. openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Medium bison https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1767 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2020-24240 https://nvd.nist.gov/vuln/detail/CVE-2020-24240 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 bison-debuginfo-3.6.4-2.oe1.aarch64.rpm bison-debugsource-3.6.4-2.oe1.aarch64.rpm bison-lang-3.6.4-2.oe1.aarch64.rpm bison-devel-3.6.4-2.oe1.aarch64.rpm bison-3.6.4-2.oe1.aarch64.rpm bison-debuginfo-3.6.4-3.oe1.aarch64.rpm bison-3.6.4-3.oe1.aarch64.rpm bison-debugsource-3.6.4-3.oe1.aarch64.rpm bison-devel-3.6.4-3.oe1.aarch64.rpm bison-lang-3.6.4-3.oe1.aarch64.rpm bison-help-3.6.4-2.oe1.noarch.rpm bison-help-3.6.4-3.oe1.noarch.rpm bison-3.6.4-2.oe1.src.rpm bison-3.6.4-3.oe1.src.rpm bison-3.6.4-2.oe1.x86_64.rpm bison-devel-3.6.4-2.oe1.x86_64.rpm bison-lang-3.6.4-2.oe1.x86_64.rpm bison-debugsource-3.6.4-2.oe1.x86_64.rpm bison-debuginfo-3.6.4-2.oe1.x86_64.rpm bison-debuginfo-3.6.4-3.oe1.x86_64.rpm bison-devel-3.6.4-3.oe1.x86_64.rpm bison-3.6.4-3.oe1.x86_64.rpm bison-lang-3.6.4-3.oe1.x86_64.rpm bison-debugsource-3.6.4-3.oe1.x86_64.rpm GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a 0 byte is encountered. NOTE: there is a risk only if Bison is used with untrusted input, and the observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug report was intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison. 2022-07-22 CVE-2020-24240 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 Medium 5.5 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H bison security update 2022-07-22 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1767