Buffer overflow vulnerability in function src_parser_trans_stage_1_2_3 trgil gilcc before commit 803969389ca9c06237075a7f8eeb1a19e6651759, allows attackers to cause a denial of service.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/trgil/gilcc/issues/1 | third party advisory issue tracking |
https://github.com/trgil/gilcc/commit/803969389ca9c06237075a7f8eeb1a19e6651759 | third party advisory patch |