Date: Tue, 24 Nov 2015 13:00:38 +0100 From: Hanno Böck <hanno@...eck.de> To: Fabian Keil <freebsd-listen@...iankeil.de> Cc: oss-security@...ts.openwall.com Subject: Re: Heap Overflow in PCRE On Tue, 24 Nov 2015 12:57:09 +0100 Fabian Keil <freebsd-listen@...iankeil.de> wrote: > The last sentence seems overly broad to me as many (most?) > applications use trusted PCRE patterns (that get parsed and executed) > to parse untrusted input. > > For this use case the issues above don't seem to require immediate > action. True. I changed the wording to better reflect that. -- Hanno Böck http://hboeck.de/ mail/jabber: hanno@...eck.de GPG: BBB51E42 [ CONTENT OF TYPE application/pgp-signature SKIPPED ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ