Date: Mon, 10 Aug 2015 10:34:55 +0000 (UTC) From: Jason Unovitch <junovitch@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r393854 - head/security/vuxml Message-ID: <201508101034.t7AAYttr074708@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: junovitch Date: Mon Aug 10 10:34:54 2015 New Revision: 393854 URL: https://svnweb.freebsd.org/changeset/ports/393854 Log: Document PCRE heap overflow vulnerability in '(?|' situations PR: 202209 Security: ff0acfb4-3efa-11e5-93ad-002590263bf5 Approved by: feld (mentor) Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Aug 10 10:29:49 2015 (r393853) +++ head/security/vuxml/vuln.xml Mon Aug 10 10:34:54 2015 (r393854) @@ -58,6 +58,40 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ff0acfb4-3efa-11e5-93ad-002590263bf5"> + <topic>pcre -- heap overflow vulnerability in '(?|' situations</topic> + <affects> + <package> + <name>pcre</name> + <range><le>8.37_2</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Venustech ADLAB reports:</p> + <blockquote cite="https://bugs.exim.org/show_bug.cgi?id=1667"> + <p>PCRE library is prone to a vulnerability which leads to Heap + Overflow. During the compilation of a malformed regular expression, + more data is written on the malloced block than the expected size + output by compile_regex. Exploits with advanced Heap Fengshui + techniques may allow an attacker to execute arbitrary code in the + context of the user running the affected application.</p> + <p>Latest version of PCRE is prone to a Heap Overflow vulnerability + which could caused by the following regular expression.</p> + <p>/(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/</p> + </blockquote> + </body> + </description> + <references> + <freebsdpr>ports/202209</freebsdpr> + <url>https://bugs.exim.org/show_bug.cgi?id=1667</url> + </references> + <dates> + <discovery>2015-08-05</discovery> + <entry>2015-08-10</entry> + </dates> + </vuln> + <vuln vid="8eee06d4-c21d-4f07-a669-455151ff426f"> <topic>mozilla -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201508101034.t7AAYttr074708>