It was reported that the update for flex as released in DSA-3653-1 did
not completely address CVE-2016-6354 as intended due to problems in the
patch handling and regenerated files during the build. Additionally a
regression was introduced, causing new warnings when compiling flex
generated code. Updated packages are now available to address these
problems. For reference, the relevant part of the original advisory
Alexander Sulfrian discovered a buffer overflow in the
yy_get_next_buffer() function generated by Flex, which may result in
denial of service and potentially the execution of code if operating on
data from untrusted sources.
Affected applications need to be rebuild.
For the stable distribution (jessie), this problem has been fixed in
We recommend that you upgrade your flex packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
Debian Security Advisory DSA-3653-2 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
September 04, 2016 https://www.debian.org/security/faq