diff options
author | Ludovic Courtès <[email protected]> | 2016-11-13 00:34:16 +0100 |
---|---|---|
committer | Ludovic Courtès <[email protected]> | 2016-11-13 00:34:16 +0100 |
commit | 2cab1dd58b9a8fb4db8f46a0b00e1358fc0de21b (patch) | |
tree | b0f12de9371ebbd806214df841cf3a1c116d5431 /gnu/packages/patches/flex-CVE-2016-6354.patch | |
parent | 15abcabe4e1d34416714eae66dba32ff96d05a6f (diff) | |
parent | de7da4e5d14a1acace1a89d9c520d336eecc7e45 (diff) |
Merge branch 'core-updates'
Diffstat (limited to 'gnu/packages/patches/flex-CVE-2016-6354.patch')
-rw-r--r-- | gnu/packages/patches/flex-CVE-2016-6354.patch | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/gnu/packages/patches/flex-CVE-2016-6354.patch b/gnu/packages/patches/flex-CVE-2016-6354.patch new file mode 100644 index 0000000000..1f3cb028d4 --- /dev/null +++ b/gnu/packages/patches/flex-CVE-2016-6354.patch @@ -0,0 +1,30 @@ +Fix CVE-2016-6354 (Buffer overflow in generated code (yy_get_next_buffer). + +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354 +https://security-tracker.debian.org/tracker/CVE-2016-6354 + +Patch copied from upstream source repository: +https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466 + +From a5cbe929ac3255d371e698f62dc256afe7006466 Mon Sep 17 00:00:00 2001 +From: Will Estes <[email protected]> +Date: Sat, 27 Feb 2016 11:56:05 -0500 +Subject: [PATCH] Fixed incorrect integer type + +--- + src/flex.skl | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/flex.skl b/src/flex.skl +index 36a526a..64f853d 100644 +--- a/src/flex.skl ++++ b/src/flex.skl +@@ -1703,7 +1703,7 @@ int yyFlexLexer::yy_get_next_buffer() + + else + { +- yy_size_t num_to_read = ++ int num_to_read = + YY_CURRENT_BUFFER_LVALUE->yy_buf_size - number_to_move - 1; + + while ( num_to_read <= 0 ) |