https://bugzilla.redhat.com/show_bug.cgi?id=1312782
Bug ID: 1312782
Summary: pcre: Heap buffer overflow in pcretest causing
infinite loop
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority: medium
Assignee: [email protected]
Reporter: [email protected]
CC: [email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected],
[email protected]
Heap-based buffer overread caused by specially crafted input triggering
infinite loop in pcretest.c was found affecting pcre 8.38. pcretest went into
loop if global matching was requested with an ovector size less than 2.
Upstream bug:
https://bugs.exim.org/show_bug.cgi?id=1777
Upstream patch:
http://vcs.pcre.org/pcre?view=revision&revision=1637
CVE request:
http://seclists.org/oss-sec/2016/q1/460
--
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
mingw mailing list
[email protected]
http://lists.fedoraproject.org/admin/lists/[email protected]