A use-after-free vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2024-1923 | Exploit Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRLGNQM33KAWVWP5RPMAPHWNP3IY5YW/ | Mailing List Third Party Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2024-1923 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1923 |
Configurations
History
No history.
Information
Published : 2024-02-20 16:15
Updated : 2025-11-04 19:16
NVD link : CVE-2024-23310
Mitre link : CVE-2024-23310
CVE.ORG link : CVE-2024-23310
JSON object : View
Products Affected
fedoraproject
- fedora
libbiosig_project
- libbiosig
