[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.4] flex: buffer overflow in generated code (yy_get_next_buffer) (CVE-2016-6354)

ID: oval:org.secpod.oval:def:1800560Date: (C)2018-03-28   (M)2023-12-07
Class: PATCHFamily: unix




flex incorrectly resized the num_to_read variable in yy_get_next_buffer. The buffer is resized if this value is less or equal to zero. With special crafted input it is possible, that the buffer is not resized if the input is larger than the default buffer size of 16k. This allows a heap buffer overflow. Partially Fixed In Version: flex 2.6.1 Reference: Patches:

Platform:
Alpine Linux 3.4
Product:
flex
Reference:
6088
CVE-2016-6354
CVE    1
CVE-2016-6354
CPE    2
cpe:/o:alpinelinux:alpine_linux:3.4
cpe:/a:flex:flex

© SecPod Technologies