CVE-2020-23856

Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:cflow:1.6:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

History

07 Nov 2023, 03:19

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BLSXGFK2NYPCJMPHSHE3W56ZU3ZO6RD7/', 'name': 'FEDORA-2021-6ef76430d0', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZTTKZX274BVFZX7TMPEZG6UWL6UPMQF/', 'name': 'FEDORA-2021-e8cab459ab', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZTTKZX274BVFZX7TMPEZG6UWL6UPMQF/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BLSXGFK2NYPCJMPHSHE3W56ZU3ZO6RD7/ -

01 Jan 2022, 17:52

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BLSXGFK2NYPCJMPHSHE3W56ZU3ZO6RD7/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BLSXGFK2NYPCJMPHSHE3W56ZU3ZO6RD7/ - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZTTKZX274BVFZX7TMPEZG6UWL6UPMQF/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZTTKZX274BVFZX7TMPEZG6UWL6UPMQF/ - Mailing List, Third Party Advisory
First Time Fedoraproject fedora
Fedoraproject

01 Jun 2021, 06:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BLSXGFK2NYPCJMPHSHE3W56ZU3ZO6RD7/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZTTKZX274BVFZX7TMPEZG6UWL6UPMQF/ -

24 May 2021, 19:53

Type Values Removed Values Added
CWE CWE-416
CPE cpe:2.3:a:gnu:cflow:1.6:*:*:*:*:*:*:*
References (MISC) https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html - (MISC) https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html - Exploit, Mailing List, Vendor Advisory
References (MISC) https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284 - (MISC) https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5

18 May 2021, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-18 15:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-23856

Mitre link : CVE-2020-23856

CVE.ORG link : CVE-2020-23856


JSON object : View

Products Affected

fedoraproject

  • fedora

gnu

  • cflow
CWE
CWE-416

Use After Free