CVE-2023-7256

Source
https://cve.org/CVERecord?id=CVE-2023-7256
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-7256.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-7256
Downstream
Related
Published
2024-08-30T23:44:04.383Z
Modified
2026-05-12T04:12:58.235981Z
Severity
  • 4.4 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Double-free in libpcap before 1.10.5 with remote packet capture support.
Details

In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.

Database specific
{
    "cwe_ids": [
        "CWE-415"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/7xxx/CVE-2023-7256.json",
    "cna_assigner": "Tcpdump"
}
References

Affected packages

Git / github.com/the-tcpdump-group/libpcap

Affected ranges

Type
GIT
Repo
https://github.com/the-tcpdump-group/libpcap
Events

Affected versions

libpcap-1.*
libpcap-1.10-bp
libpcap-1.10.0
libpcap-1.10.1
libpcap-1.10.2
libpcap-1.10.3
libpcap-1.10.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-7256.json"