https://bugzilla.redhat.com/show_bug.cgi?id=1312782
Bug ID: 1312782 Summary: pcre: Heap buffer overflow in pcretest causing infinite loop Product: Security Response Component: vulnerability Keywords: Security Severity: medium Priority: medium Assignee: security-response-t...@redhat.com Reporter: ama...@redhat.com CC: adam.sto...@gmail.com, and...@beekhof.net, csuth...@redhat.com, databases-ma...@redhat.com, dk...@redhat.com, erik-fed...@vanpienbroek.nl, fedora-mi...@lists.fedoraproject.org, fiden...@redhat.com, jcl...@redhat.com, jdor...@redhat.com, jdo...@redhat.com, jgrul...@redhat.com, jor...@redhat.com, klem...@redhat.com, l...@redhat.com, lkund...@v3.sk, marcandre.lur...@redhat.com, mbaba...@redhat.com, mcla...@redhat.com, mmasl...@redhat.com, myarb...@redhat.com, pmy...@valanet.net, ppi...@redhat.com, pslav...@redhat.com, rcol...@redhat.com, rjo...@redhat.com, rmegg...@redhat.com, rsvob...@redhat.com, t.sai...@alumni.ethz.ch, twa...@redhat.com, walt...@redhat.com, webstack-t...@redhat.com, w...@redhat.com Heap-based buffer overread caused by specially crafted input triggering infinite loop in pcretest.c was found affecting pcre 8.38. pcretest went into loop if global matching was requested with an ovector size less than 2. Upstream bug: https://bugs.exim.org/show_bug.cgi?id=1777 Upstream patch: http://vcs.pcre.org/pcre?view=revision&revision=1637 CVE request: http://seclists.org/oss-sec/2016/q1/460 -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ mingw mailing list mingw@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/mingw@lists.fedoraproject.org