Bug#324531: pcre3: CAN-2005-2491

2005-08-24 Thread Sven Mueller
Stefan Fritsch wrote on 23/08/2005 23:15: Patch extracted from difference between upstream versions 6.0 and 6.1, modified to patch version 4.5. Patch is attached. While the issue corresponding to your patch should be fixed as well, this is not the patch for CAN-2005-2491. The securitytracker

Bug#324531: PCRE3: CAN-2005-2491 for oldstable

2005-08-24 Thread Martin Pitt
Hi! Since I have to fix apache2 2.0.50 for Ubuntu, which still has an embedded pcre 3.x, I also took a look at the woody version. I took a look at the code and played with the test suite, and it seems to me that the capture part works ok; just the integer underflow must be fixed: --- pcre.c +++

Bug#324531: pcre3: CAN-2005-2491

2005-08-24 Thread Sven Mueller
Stefan Fritsch wrote on 23/08/2005 23:15: Patch extracted from difference between upstream versions 6.0 and 6.1, modified to patch version 4.5. Patch is attached. While the issue corresponding to your patch should be fixed as well, this is not the patch for CAN-2005-2491. The securitytracker

Bug#324531: PCRE3: CAN-2005-2491 for oldstable

2005-08-24 Thread Martin Schulze
Martin Pitt wrote: Hi! Since I have to fix apache2 2.0.50 for Ubuntu, which still has an embedded pcre 3.x, I also took a look at the woody version. I took a look at the code and played with the test suite, and it seems to me that the capture part works ok; just the integer underflow must

Bug#324531: pcre3: CAN-2005-2491

2005-08-24 Thread Florian Weimer
* Sven Mueller: +/* Read the minimum value and do a paranoid check: a negative value indicates +an integer overflow. */ + while ((digitab[*p] ctype_digit) != 0) min = min * 10 + *p++ - '0'; +if (min 0 || min 65535) This doesn't work. Signed integer overflow is undefined. Future GCC

Bug#324531: pcre3: CAN-2005-2491

2005-08-23 Thread Sven Mueller
Joey Hess wrote on 23/08/2005 01:43: Adrian Bunk wrote: It should be checked which of the versions in unstable/testing, stable and oldstable might be affected by CAN-2005-2491 (PCRE Heap Overflow May Let Users Execute Arbitrary Code). Which is unfortunatly still marked as reserved in the

Bug#324531: pcre3: CAN-2005-2491

2005-08-23 Thread Stefan Fritsch
Hi, Patch extracted from difference between upstream versions 6.0 and 6.1, modified to patch version 4.5. Patch is attached. While the issue corresponding to your patch should be fixed as well, this is not the patch for CAN-2005-2491. The securitytracker page states that 6.1 and prior

Bug#324531: pcre3: CAN-2005-2491

2005-08-22 Thread Adrian Bunk
Package: pcre3 Severity: critical Tags: security, woody, sarge, etch, sid It should be checked which of the versions in unstable/testing, stable and oldstable might be affected by CAN-2005-2491 (PCRE Heap Overflow May Let Users Execute Arbitrary Code). -- To UNSUBSCRIBE, email to [EMAIL

Bug#324531: pcre3: CAN-2005-2491

2005-08-22 Thread Mark Baker
On Mon, Aug 22, 2005 at 06:15:53PM +0200, Adrian Bunk wrote: It should be checked which of the versions in unstable/testing, stable and oldstable might be affected by CAN-2005-2491 (PCRE Heap Overflow May Let Users Execute Arbitrary Code). I'm away on business until wednesday night; if