Summary: | <dev-libs/libpcre-8.38-r1: Heap Overflow Vulnerability (CVE-2016-1283) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | base-system, hydrapolic, oz.tiram |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugs.exim.org/show_bug.cgi?id=1767 | ||
See Also: |
https://bugs.exim.org/show_bug.cgi?id=1767 https://bugs.gentoo.org/show_bug.cgi?id=636694 |
||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 575546 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2016-01-03 09:48:58 UTC
*** Bug 573842 has been marked as a duplicate of this bug. *** added upstream patches; should be fined to stable: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=cee01d4f06b3984b8211bd3c27358f7d18cf90fb CVE-2016-1283 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1283): The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror. Added to existing GLSA. This issue was resolved and addressed in GLSA 201607-02 at https://security.gentoo.org/glsa/201607-02 by GLSA coordinator Aaron Bauman (b-man). |