blob: 84fc016a4d87ee95629c6c70823033ff9c1fba39 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200603-07">
<title>flex: Potential insecure code generation</title>
flex might generate code with a buffer overflow, making applications using
such scanners vulnerable to the execution of arbitrary code.
<product type="ebuild">flex</product>
<announced>March 10, 2006</announced>
<revised>March 10, 2006: 01</revised>
<access>remote and local</access>
<package name="sys-devel/flex" auto="yes" arch="*">
<unaffected range="ge">2.5.33-r1</unaffected>
<vulnerable range="lt">2.5.33-r1</vulnerable>
flex is a programming tool used to generate scanners (programs
which recognize lexical patterns in text).
Chris Moore discovered a buffer overflow in a special class of
lexicographical scanners generated by flex. Only scanners generated by
grammars which use either REJECT, or rules with a "variable trailing
context" might be at risk.
<impact type="normal">
An attacker could feed malicious input to an application making
use of an affected scanner and trigger the buffer overflow, potentially
resulting in the execution of arbitrary code.
Avoid using vulnerable grammar in your flex scanners.
All flex users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=sys-devel/flex-2.5.33-r1&quot;</code>
<uri link="">CVE-2006-0459</uri>
<metadata tag="requester" timestamp="Fri, 03 Mar 2006 18:28:11 +0000">
<metadata tag="bugReady" timestamp="Fri, 03 Mar 2006 18:29:09 +0000">
<metadata tag="submitter" timestamp="Tue, 07 Mar 2006 21:06:21 +0000">