Author Topic: CVE-2020-37121 - buffer overflow exploit  (Read 452081 times)

Offline SharkCZ

  • Almost regular
  • **
  • Posts: 138
CVE-2020-37121 - buffer overflow exploit
« on: February 12, 2026, 02:51:51 pm »
Seems https://nvd.nist.gov/vuln/detail/CVE-2020-37121 about a buffer overflow related exploit got published last week, but I can't find any additional information. Does anybody know what it is about? I can't see a connection between a crafted M3U playlist and C::B.
Code::Blocks package maintainer for Fedora and EPEL

Offline Miguel Gimenez

  • Developer
  • Lives here!
  • *****
  • Posts: 1868
Re: CVE-2020-37121 - buffer overflow exploit
« Reply #1 on: February 12, 2026, 04:31:43 pm »
Probably all programs compiled with SEH ten years ago are affected, but good luck opening a M3U with C::B  8).

Offline killerbot

  • Administrator
  • Lives here!
  • *****
  • Posts: 5567
Re: CVE-2020-37121 - buffer overflow exploit
« Reply #2 on: February 12, 2026, 07:49:01 pm »
Probably all programs compiled with SEH ten years ago are affected, but good luck opening a M3U with C::B  8).

that would be nice though :-)

Offline sumoreh8841

  • Single posting newcomer
  • *
  • Posts: 1
Re: CVE-2020-37121 - buffer overflow exploit
« Reply #3 on: Today at 11:43:24 am »
From the NVD description it looks like a generic SEH-based buffer overflow pattern rather than something specific to Code::Blocks itself. Has anyone checked whether this CVE is tied to a bundled third-party library rather than the IDE core?