Login-Name Passwort


Sicherheit: Pufferüberlauf in PCRE
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in PCRE
ID: FEDORA-2017-a8dc348834
Distribution: Fedora
Plattformen: Fedora 24
Datum: Mi, 22. Februar 2017, 23:20
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004
Applikationen: PCRE


Name        : pcre
Product : Fedora 24
Version : 8.40
Release : 2.fc24
URL : http://www.pcre.org/
Summary : Perl-compatible regular expression library
Description :
PCRE, Perl-compatible regular expression, library has its own native API, but
a set of wrapper functions that are based on the POSIX API are also supplied
in the libpcreposix library. Note that this just provides a POSIX calling
interface to PCRE: the regular expressions themselves still follow Perl syntax
and semantics. Detailed change log is provided by pcre-doc package.

Update Information:

This release fixes pcregrep multi-line matching with --only-matching option, a
crash when JIT-compiling some patterns (CVE-2017-6004) and a possible buffer
overflow when formatting a pcregrep error message.

[ 1 ] Bug #1425365 - CVE-2017-6004 pcre: Out-of-bounds read in
compile_bracket_matchingpath function

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade pcre' at the command line.
For more information, refer to the dnf documentation available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Unterstützer werden
Neue Nachrichten