Debian Package Tracker
Register | Log in
Subscribe

cflow

control flow analyzer for C source files

Choose email to subscribe with

general
  • source: cflow (main)
  • version: 1:1.7-5
  • maintainer: Marcos Talau (DMD) (LowNMU)
  • arch: all any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:1.6-4
  • oldstable: 1:1.7-4
  • stable: 1:1.7-5
  • testing: 1:1.7-5
  • unstable: 1:1.7-5
versioned links
  • 1:1.6-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.7-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:1.7-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • cflow
  • cflow-doc
  • cflow-l10n
action needed
Problems while searching for a new upstream version high
uscan had problems while searching for a new upstream version:
In debian/watch no matching files for watch source
  https://ftp.gnu.org/gnu/
Created: 2025-08-20 Last update: 2025-08-31 10:00
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-8736: A vulnerability, which was classified as critical, has been found in GNU cflow up to 1.8. Affected by this issue is the function yylex of the file c.c of the component Lexer. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
Created: 2025-08-15 Last update: 2025-08-23 19:31
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2025-8736: A vulnerability, which was classified as critical, has been found in GNU cflow up to 1.8. Affected by this issue is the function yylex of the file c.c of the component Lexer. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
Created: 2025-08-15 Last update: 2025-08-23 19:31
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2025-8736: (needs triaging) A vulnerability, which was classified as critical, has been found in GNU cflow up to 1.8. Affected by this issue is the function yylex of the file c.c of the component Lexer. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-08-15 Last update: 2025-08-23 19:31
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2025-8736: (needs triaging) A vulnerability, which was classified as critical, has been found in GNU cflow up to 1.8. Affected by this issue is the function yylex of the file c.c of the component Lexer. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

You can find information about how to handle this issue in the security team's documentation.

Created: 2025-08-15 Last update: 2025-08-23 19:31
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.2).
Created: 2024-04-07 Last update: 2025-02-27 13:25
news
[rss feed]
  • [2023-09-09] cflow 1:1.7-5 MIGRATED to testing (Debian testing watch)
  • [2023-09-06] Accepted cflow 1:1.7-5 (source) into unstable (Marcos Talau)
  • [2022-09-05] cflow 1:1.7-4 MIGRATED to testing (Debian testing watch)
  • [2022-09-04] Accepted cflow 1:1.7-4 (source) into unstable (Marcos Talau)
  • [2022-06-13] cflow 1:1.7-3 MIGRATED to testing (Debian testing watch)
  • [2022-06-10] Accepted cflow 1:1.7-3 (source) into unstable (Marcos Talau)
  • [2022-01-03] cflow 1:1.7-2 MIGRATED to testing (Debian testing watch)
  • [2021-12-31] Accepted cflow 1:1.7-2 (source) into unstable (Marcos Talau)
  • [2021-12-31] cflow 1:1.6-6 MIGRATED to testing (Debian testing watch)
  • [2021-12-30] Accepted cflow 1:1.7-1 (source amd64 all) into experimental (Marcos Talau)
  • [2021-12-28] Accepted cflow 1:1.6-6 (source) into unstable (Marcos Talau) (signed by: Joao Eriberto Mota Filho)
  • [2019-08-18] cflow 1:1.6-4 MIGRATED to testing (Debian testing watch)
  • [2019-08-16] Accepted cflow 1:1.6-4 (source) into unstable (Dmitry Bogatov)
  • [2019-07-12] Accepted cflow 1:1.6-3 (source) into unstable (Dmitry Bogatov)
  • [2019-07-07] Accepted cflow 1:1.6-2 (source amd64 all) into experimental, experimental (Dmitry Bogatov)
  • [2019-03-06] cflow 1:1.6-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-23] Accepted cflow 1:1.6-1 (source) into unstable (Dmitry Bogatov)
  • [2019-01-26] cflow 1:1.5-2 MIGRATED to testing (Debian testing watch)
  • [2019-01-24] Accepted cflow 1:1.5-2 (source) into unstable (Dmitry Bogatov)
  • [2018-12-15] cflow 1:1.5-1 MIGRATED to testing (Debian testing watch)
  • [2018-12-10] Accepted cflow 1:1.5-1 (amd64 source) into unstable (Dmitry Bogatov)
  • [2014-05-21] cflow 1:1.4+dfsg1-3 MIGRATED to testing (Debian testing watch)
  • [2014-05-10] Accepted cflow 1:1.4+dfsg1-3 (source i386) (Serafeim Zanikolas)
  • [2012-12-19] cflow 1:1.4+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2012-12-14] Accepted cflow 1:1.4+dfsg1-2 (source i386) (Serafeim Zanikolas)
  • [2012-12-12] Accepted cflow 1:1.4+dfsg1-1 (source i386) (Serafeim Zanikolas)
  • [2011-12-08] cflow 1:1.4-1 MIGRATED to testing (Debian testing watch)
  • [2011-11-27] Accepted cflow 1:1.4-1 (source i386) (Serafeim Zanikolas)
  • [2010-08-04] cflow 1:1.3-3 MIGRATED to testing (Debian testing watch)
  • [2010-07-24] Accepted cflow 1:1.3-3 (source i386) (Serafeim Zanikolas)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 52)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:1.7-5

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing