Safety vulnerability ID: 42269
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In parser/btorsmt2.c in Boolector 3.0.0, opening a specially crafted input file leads to a use after free in get_failed_assumptions or btor_delete.
https://github.com/Boolector/boolector/commit/8d979d02e0482c7137c9f3a34e6d430dbfd1f5c5
Latest version: 3.2.4.20240823.1
Python wrapper around the Boolector SMT solver
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application