Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 127800 - sys-devel/flex: insecure code generation (buffer overflow)
Summary: sys-devel/flex: insecure code generation (buffer overflow)
Status: RESOLVED DUPLICATE of bug 122940
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-03-27 16:53 UTC by Jasper Bryant-Greene
Modified: 2006-03-27 17:03 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jasper Bryant-Greene 2006-03-27 16:53:31 UTC
Package        : flex
Vulnerability  : buffer overflow
Problem-Type   : local
Debian-specific: no
CVE ID         : CVE-2006-0459

Chris Moore discovered that flex, a scanner generator, generates code,
which allocates insufficient memory, if the grammar contains REJECT
statements or trailing context rules. This may lead to a buffer overflow
and the execution of arbitrary code.

If you use code, which is derived from a vulnerable lex grammar in
an untrusted environment you need to regenerate your scanner with the
fixed version of flex.

The old stable distribution (woody) is not affected by this problem.

For the stable distribution (sarge) this problem has been fixed in
version 2.5.31-31sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 2.5.33-1.

We recommend that you upgrade your flex package.
Comment 1 Jasper Bryant-Greene 2006-03-27 17:03:53 UTC

*** This bug has been marked as a duplicate of 122940 ***