On Wed, 2020-07-29 at 18:25 +0530, saloni wrote:
> From: Rahul Taya <rahul.t...@kpit.com>
> 
> Added below patch in libpcre
> CVE-2020-14155.patch
> 
> This patch fixes below error:
> PCRE could allow a remote attacker to execute arbitrary
> code on the system, caused by an integer overflow in
> libpcre via a large number after (?C substring.
> By sending a request with a large number, an attacker
> can execute arbitrary code on the system or
> cause the application to crash.
> 
> Upstream-Status: Pending
> 
> Tested-by: Rahul Taya <rahul.t...@kpit.com>
> Signed-off-by: Saloni Jain <saloni.j...@kpit.com>
> ---
>  .../libpcre/libpcre/CVE-2020-14155.patch           | 40
> ++++++++++++++++++++++
>  meta/recipes-support/libpcre/libpcre_8.44.bb       |  3 +-

zeus has libpcre version 8.43. Also it looks like this specific fix is
already is 8.44.

So please test and send again for proper version & branch.

Thanks,

Anuj
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#141107): 
https://lists.openembedded.org/g/openembedded-core/message/141107
Mute This Topic: https://lists.openembedded.org/mt/75863890/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub  
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to