An update for bison is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1767
Final
1.0
1.0
2022-07-22
Initial
2022-07-22
2022-07-22
openEuler SA Tool V1.0
2022-07-22
bison security update
An update for bison is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP3.
Bison is a general-purpose parser generator that converts an annotated context-free grammar into a deterministic LR or generalized LR (GLR) parser employing LALR(1) parser tables. As an experimental feature, Bison can also generate IELR(1) or canonical LR(1) parser tables. Once you are proficient with Bison, you can use it to develop a wide range of language parsers, from those used in simple desk calculators to complex programming languages.
Security Fix(es):
GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a '\0' byte is encountered. NOTE: there is a risk only if Bison is used with untrusted input, and the observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug report was intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison.(CVE-2020-24240)
An update for bison is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
bison
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1767
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2020-24240
https://nvd.nist.gov/vuln/detail/CVE-2020-24240
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
bison-debuginfo-3.6.4-2.oe1.aarch64.rpm
bison-debugsource-3.6.4-2.oe1.aarch64.rpm
bison-lang-3.6.4-2.oe1.aarch64.rpm
bison-devel-3.6.4-2.oe1.aarch64.rpm
bison-3.6.4-2.oe1.aarch64.rpm
bison-debuginfo-3.6.4-3.oe1.aarch64.rpm
bison-3.6.4-3.oe1.aarch64.rpm
bison-debugsource-3.6.4-3.oe1.aarch64.rpm
bison-devel-3.6.4-3.oe1.aarch64.rpm
bison-lang-3.6.4-3.oe1.aarch64.rpm
bison-help-3.6.4-2.oe1.noarch.rpm
bison-help-3.6.4-3.oe1.noarch.rpm
bison-3.6.4-2.oe1.src.rpm
bison-3.6.4-3.oe1.src.rpm
bison-3.6.4-2.oe1.x86_64.rpm
bison-devel-3.6.4-2.oe1.x86_64.rpm
bison-lang-3.6.4-2.oe1.x86_64.rpm
bison-debugsource-3.6.4-2.oe1.x86_64.rpm
bison-debuginfo-3.6.4-2.oe1.x86_64.rpm
bison-debuginfo-3.6.4-3.oe1.x86_64.rpm
bison-devel-3.6.4-3.oe1.x86_64.rpm
bison-3.6.4-3.oe1.x86_64.rpm
bison-lang-3.6.4-3.oe1.x86_64.rpm
bison-debugsource-3.6.4-3.oe1.x86_64.rpm
GNU Bison before 3.7.1 has a use-after-free in _obstack_free in lib/obstack.c (called from gram_lex) when a 0 byte is encountered. NOTE: there is a risk only if Bison is used with untrusted input, and the observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug report was intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison.
2022-07-22
CVE-2020-24240
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
Medium
5.5
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
bison security update
2022-07-22
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1767