Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
References
Configurations
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284 - Exploit, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BLSXGFK2NYPCJMPHSHE3W56ZU3ZO6RD7/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZTTKZX274BVFZX7TMPEZG6UWL6UPMQF/ - | |
References | () https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html - Exploit, Mailing List, Vendor Advisory |
07 Nov 2023, 03:19
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-05-18 15:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-23856
Mitre link : CVE-2020-23856
CVE.ORG link : CVE-2020-23856
JSON object : View
Products Affected
fedoraproject
- fedora
gnu
- cflow
CWE
CWE-416
Use After Free