Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23856
Reference (s):
- FEDORA:FEDORA-2021-6ef76430d0
- URL: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BLSXGFK2NYPCJMPHSHE3W56ZU3ZO6RD7/
- FEDORA:FEDORA-2021-e8cab459ab
- URL: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZTTKZX274BVFZX7TMPEZG6UWL6UPMQF/
- https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284