svn commit: r395177 - head/security/vuxml
Mark Felder
feld at FreeBSD.org
Mon Aug 24 16:10:59 UTC 2015
Author: feld
Date: Mon Aug 24 16:10:57 2015
New Revision: 395177
URL: https://svnweb.freebsd.org/changeset/ports/395177
Log:
Document devel/pcre vulnerability
Security: 6900e6f1-4a79-11e5-9ad8-14dae9d210b8
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Mon Aug 24 16:04:09 2015 (r395176)
+++ head/security/vuxml/vuln.xml Mon Aug 24 16:10:57 2015 (r395177)
@@ -58,6 +58,43 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="6900e6f1-4a79-11e5-9ad8-14dae9d210b8">
+ <topic>pcre -- heap overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>pcre</name>
+ <range><lt>8.37_4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Guanxing Wen reports:</p>
+ <blockquote cite="http://seclists.org/oss-sec/2015/q3/295">
+ <p>PCRE library is prone to a vulnerability which leads to
+ Heap Overflow.
+ During the compilation of a malformed regular expression, more data is
+ written on the malloced block than the expected size output by
+ compile_regex().
+ The Heap Overflow vulnerability is caused by the following regular
+ expression.</p>
+ <p>/(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/</p>
+ <p>A dry run of this particular regular expression with pcretest will
+ reports "double free or corruption (!prev)".
+ But it is actually a heap overflow problem.
+ The overflow only affects pcre 8.x branch, pcre2 branch is not affected.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://seclists.org/oss-sec/2015/q3/295</url>
+ <url>https://bugs.exim.org/show_bug.cgi?id=1672</url>
+ </references>
+ <dates>
+ <discovery>2015-08-21</discovery>
+ <entry>2015-08-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="9393213d-489b-11e5-b8c7-d050996490d0">
<topic>drupal -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-head
mailing list