Null Pointer Deref in GNU cflow <1.8 via Lexer yylex
CVE-2025-8735 Published on August 8, 2025
GNU cflow Lexer c.c yylex null pointer dereference
A vulnerability classified as problematic was found in GNU cflow up to 1.8. Affected by this vulnerability is the function yylex of the file c.c of the component Lexer. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
Timeline
Advisory disclosed
VulDB entry created
VulDB entry last update
Weakness Types
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
Improper Resource Shutdown or Release
The program does not release or incorrectly releases a resource before it is made available for re-use. When a resource is created or allocated, the developer is responsible for properly releasing the resource as well as accounting for all potential paths of expiration or invalidation, such as a set period of time or revocation.
Products Associated with CVE-2025-8735
Want to know whenever a new CVE is published for GNU Cflow? stack.watch will email you.
Affected Versions
GNU cflow:- Version 1.0 is affected.
- Version 1.1 is affected.
- Version 1.2 is affected.
- Version 1.3 is affected.
- Version 1.4 is affected.
- Version 1.5 is affected.
- Version 1.6 is affected.
- Version 1.7 is affected.
- Version 1.8 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.