First published: Tue May 18 2021(Updated: )
Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU cflow | =1.6 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-23856 is medium with a CVSS score of 5.5.
CVE-2020-23856 is a use-after-free vulnerability in cflow 1.6 that can cause a denial of service.
CVE-2020-23856 affects cflow 1.6 by exploiting a use-after-free vulnerability in the void call(char *name, int line) function at src/parser.c.
To fix CVE-2020-23856, update cflow to a version that has addressed the vulnerability.
Yes, you can find references for CVE-2020-23856 at the following links: [LINKS]