{"id":"PYSEC-2019-252","details":"In parser/btorsmt2.c in Boolector 3.0.0, opening a specially crafted input file leads to a use after free in get_failed_assumptions or btor_delete.","aliases":["CVE-2019-7560","GHSA-g58x-799h-v9h6"],"modified":"2024-11-25T22:42:14.884068Z","published":"2019-02-07T07:29:00Z","references":[{"type":"REPORT","url":"https://github.com/Boolector/boolector/issues/29"},{"type":"REPORT","url":"https://github.com/Boolector/boolector/issues/28"}],"affected":[{"package":{"name":"pyboolector","ecosystem":"PyPI","purl":"pkg:pypi/pyboolector"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.0"}]}],"versions":["3.0.0.1","3.0.0.20191102.28","3.0.0.20191119.1","3.0.0.20191119.2"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/pyboolector/PYSEC-2019-252.yaml"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}