Bug#324531: pcre3: CAN-2005-2491

2005-08-24 Thread Florian Weimer
* Sven Mueller: > +/* Read the minimum value and do a paranoid check: a negative value indicates > +an integer overflow. */ > + > while ((digitab[*p] & ctype_digit) != 0) min = min * 10 + *p++ - '0'; > +if (min < 0 || min > 65535) This doesn't work. Signed integer overflow is undefined. Future

Bug#324531: PCRE3: CAN-2005-2491 for oldstable

2005-08-24 Thread Martin Schulze
Martin Pitt wrote: > Hi! > > Since I have to fix apache2 2.0.50 for Ubuntu, which still has an > embedded pcre 3.x, I also took a look at the woody version. I took a > look at the code and played with the test suite, and it seems to me > that the capture part works ok; just the integer underflow m

Bug#324531: pcre3: CAN-2005-2491

2005-08-24 Thread Sven Mueller
Stefan Fritsch wrote on 23/08/2005 23:15: >>Patch extracted from difference between upstream versions 6.0 and >>6.1, modified to patch version 4.5. Patch is attached. > > While the issue corresponding to your patch should be fixed as well, > this is not the patch for CAN-2005-2491. The securitytrac

Bug#324531: PCRE3: CAN-2005-2491 for oldstable

2005-08-24 Thread Martin Pitt
Hi! Since I have to fix apache2 2.0.50 for Ubuntu, which still has an embedded pcre 3.x, I also took a look at the woody version. I took a look at the code and played with the test suite, and it seems to me that the capture part works ok; just the integer underflow must be fixed: --- pcre.c +++ p

Bug#324531: pcre3: CAN-2005-2491

2005-08-24 Thread Sven Mueller
Stefan Fritsch wrote on 23/08/2005 23:15: >>Patch extracted from difference between upstream versions 6.0 and >>6.1, modified to patch version 4.5. Patch is attached. > > While the issue corresponding to your patch should be fixed as well, > this is not the patch for CAN-2005-2491. The securitytrac

Bug#324531: pcre3: CAN-2005-2491

2005-08-23 Thread Stefan Fritsch
Hi, > Patch extracted from difference between upstream versions 6.0 and > 6.1, modified to patch version 4.5. Patch is attached. While the issue corresponding to your patch should be fixed as well, this is not the patch for CAN-2005-2491. The securitytracker page states that 6.1 and prior versi

Bug#324531: pcre3: CAN-2005-2491

2005-08-23 Thread Sven Mueller
Joey Hess wrote on 23/08/2005 01:43: > Adrian Bunk wrote: > >>It should be checked which of the versions in unstable/testing, >>stable and oldstable might be affected by CAN-2005-2491 >>(PCRE Heap Overflow May Let Users Execute Arbitrary Code). > > > Which is unfortunatly still marked as "reserv

Bug#324531: pcre3: CAN-2005-2491

2005-08-22 Thread Adrian Bunk
On Mon, Aug 22, 2005 at 07:43:53PM -0400, Joey Hess wrote: > Adrian Bunk wrote: > > It should be checked which of the versions in unstable/testing, > > stable and oldstable might be affected by CAN-2005-2491 > > (PCRE Heap Overflow May Let Users Execute Arbitrary Code). > > Which is unfortunatly s

Bug#324531: pcre3: CAN-2005-2491

2005-08-22 Thread Joey Hess
Adrian Bunk wrote: > It should be checked which of the versions in unstable/testing, > stable and oldstable might be affected by CAN-2005-2491 > (PCRE Heap Overflow May Let Users Execute Arbitrary Code). Which is unfortunatly still marked as "reserved" in the CVE db, so I don't have any more info

Bug#324531: pcre3: CAN-2005-2491

2005-08-22 Thread Mark Baker
On Mon, Aug 22, 2005 at 06:15:53PM +0200, Adrian Bunk wrote: > It should be checked which of the versions in unstable/testing, > stable and oldstable might be affected by CAN-2005-2491 > (PCRE Heap Overflow May Let Users Execute Arbitrary Code). I'm away on business until wednesday night; if anyt

Bug#324531: pcre3: CAN-2005-2491

2005-08-22 Thread Adrian Bunk
Package: pcre3 Severity: critical Tags: security, woody, sarge, etch, sid It should be checked which of the versions in unstable/testing, stable and oldstable might be affected by CAN-2005-2491 (PCRE Heap Overflow May Let Users Execute Arbitrary Code). -- To UNSUBSCRIBE, email to [EMAIL PROTEC