Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 29 Feb 2016 10:15:39 +0100
From: Adam Maris <amaris@...hat.com>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: CVE request: Heap buffer overflow in pcretest

Heap-based buffer overread caused by specially crafted input triggering
infinite loop in pcretest.c was found affecting pcre 8.38. pcretest went
into loop if global matching was requested with an ovector size less than 2.

Upstream bug:

https://bugs.exim.org/show_bug.cgi?id=1777

Upstream fix:

http://vcs.pcre.org/pcre?view=revision&revision=1637

Regards,

-- 
Adam Mariš, Red Hat Product Security
1CCD 3446 0529 81E3 86AF  2D4C 4869 76E7 BEF0 6BC2


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ