On Mon, Sep 5, 2016 at 12:06 AM Salvatore Bonaccorso <car...@debian.org>
wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-3653-2                   secur...@debian.org
> https://www.debian.org/security/                     Salvatore Bonaccorso
> September 04, 2016                    https://www.debian.org/security/faq
> - -------------------------------------------------------------------------
>
> Package        : flex
> CVE ID         : CVE-2016-6354
> Debian Bug     : 832768 835542
>
> It was reported that the update for flex as released in DSA-3653-1 did
> not completely address CVE-2016-6354 as intended due to problems in the
> patch handling and regenerated files during the build. Additionally a
> regression was introduced, causing new warnings when compiling flex
> generated code. Updated packages are now available to address these
> problems. For reference, the relevant part of the original advisory
> text follows.
>
> Alexander Sulfrian discovered a buffer overflow in the
> yy_get_next_buffer() function generated by Flex, which may result in
> denial of service and potentially the execution of code if operating on
> data from untrusted sources.
>
> Affected applications need to be rebuild.
>
> For the stable distribution (jessie), this problem has been fixed in
> version 2.5.39-8+deb8u2.
>
> We recommend that you upgrade your flex packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: https://www.debian.org/security/
>
> Mailing list: debian-security-annou...@lists.debian.org
>
>
This only references a fix for stable. Does that mean that the version in
stretch / sid did not suffer from the regression?

Mark

Reply via email to