USN-5375-1: GNU cflow vulnerability
12 April 2022
GNU cflow could be made to crash or run programs if it received specially crafted input.
Releases
Packages
- cflow - Analyze control flow in C source files
Details
It was discovered that GNU cflow was incorrectly handling memory cleanup
operations at the end of a compilation module. An attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
cflow
-
1:1.4+dfsg1-3ubuntu1.18.04.1~esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
cflow
-
1:1.4+dfsg1-3ubuntu1.16.04.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.