Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee. Reference: https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html
Created cflow tracking bugs for this issue: Affects: fedora-all [bug 1962214]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.