Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2019-16166

Published: 9 September 2019

GNU cflow through 1.6 has a heap-based buffer over-read in the nexttoken function in parser.c.

Notes

AuthorNote
ccdm94
according to commit notes provided by upstream,
the fix for this issue can be found in b9a7cd5e9d4.
This is the same fix as the one for CVE-2019-16165.
However, it seems like version 1.7, which would
already include it, is still vulnerable to the issue,
the reproducer file generating the same heap-based
buffer overflow error when cflow is run with ASAN.
Therefore, it seems like a patch for this
vulnerability is still needed as of version 1.7.

Priority

Medium

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
cflow
Launchpad, Ubuntu, Debian
bionic Needed

disco Ignored
(end of life)
eoan Ignored
(end of life)
focal Needed

groovy Ignored
(end of life)
hirsute Ignored
(end of life)
impish Ignored
(end of life)
jammy Needed

kinetic Ignored
(end of life, was needed)
lunar Ignored
(end of life, was needed)
mantic Needed

trusty Does not exist

upstream Needed

xenial Needed

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H