From ${URL} : Heap buffer overflow issue was reported [1] in PCRE when processing a specially crafted regular expression. Upstream patch for this: http://www.exim.org/viewvc/pcre2?view=rev&revision=154 The next upstream release that will contain the above fix is likely to be around Feb/Mar next year (2015). [1]: http://bugs.exim.org/show_bug.cgi?id=1546 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CVE-2014-8964 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8964): Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
This is fixed in the new version of pcre called pcre2: ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre2-10.10.tar.bz2 Do we want to keep the same name for this package?
Added to existing GLSA.
This issue was resolved and addressed in GLSA 201607-02 at https://security.gentoo.org/glsa/201607-02 by GLSA coordinator Aaron Bauman (b-man).