Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
References
Link | Resource |
---|---|
https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html | Exploit Mailing List Vendor Advisory |
https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BLSXGFK2NYPCJMPHSHE3W56ZU3ZO6RD7/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZTTKZX274BVFZX7TMPEZG6UWL6UPMQF/ | Mailing List Third Party Advisory |
Information
Published : 2021-05-18 08:15
Updated : 2022-01-01 09:52
NVD link : CVE-2020-23856
Mitre link : CVE-2020-23856
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
fedoraproject
- fedora
gnu
- cflow