{"id":"USN-5375-1","summary":"cflow vulnerability","details":"It was discovered that GNU cflow was incorrectly handling memory cleanup\noperations at the end of a compilation module. An attacker could possibly\nuse this issue to cause a denial of service or execute arbitrary code.\n","modified":"2026-04-24T09:25:38.741641Z","published":"2022-04-12T12:19:46Z","related":["UBUNTU-CVE-2019-16165"],"upstream":["CVE-2019-16165","UBUNTU-CVE-2019-16165"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5375-1"}],"affected":[{"package":{"name":"cflow","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/cflow@1:1.4+dfsg1-3ubuntu1.16.04.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.4+dfsg1-3ubuntu1.16.04.1~esm1"}]}],"versions":["1:1.4+dfsg1-3ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"cflow","binary_version":"1:1.4+dfsg1-3ubuntu1.16.04.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5375-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[]}}},{"package":{"name":"cflow","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/cflow@1:1.4+dfsg1-3ubuntu1.18.04.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.4+dfsg1-3ubuntu1.18.04.1~esm1"}]}],"versions":["1:1.4+dfsg1-3ubuntu1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"cflow","binary_version":"1:1.4+dfsg1-3ubuntu1.18.04.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5375-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[]}}}],"schema_version":"1.7.5"}