Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZTTKZX274BVFZX7TMPEZG6UWL6UPMQF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BLSXGFK2NYPCJMPHSHE3W56ZU3ZO6RD7/
https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html
https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284
Source: Mitre, NVD
Published: 2021-05-18
Updated: 2023-11-07
Base Score: 2.1
Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P
Severity: Low
Base Score: 5.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Severity: Medium
EPSS: 0.00113