Sicherheit: Pufferüberlauf in PCRE
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in PCRE
ID: FEDORA-2015-afafa29551
Distribution: Fedora
Plattformen: Fedora 22
Datum: Sa, 12. Dezember 2015, 11:39
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380
Applikationen: PCRE


Name        : pcre
Product : Fedora 22
Version : 8.37
Release : 7.fc22
URL : http://www.pcre.org/
Summary : Perl-compatible regular expression library
Description :
Perl-compatible regular expression library.
PCRE has its own native API, but a set of "wrapper" functions that are
based on
the POSIX API are also supplied in the library libpcreposix. Note that this
just provides a POSIX calling interface to PCRE: the regular expressions
themselves still follow Perl syntax and semantics. The header file
for the POSIX-style functions is called pcreposix.h.

Update Information:

This release fixes CVE-2015-8380 (a heap-based buffer overflow in pcre_exec()
when ovector has size 1). ---- This release fixes a crash when compiling an
expression with long (*MARK) or (*THEN) names. It also fixes compiling a POSIX
character class followed by a single ASCII character in a class item while UCP
mode is active. It also fixes mismatching characters in the range 128-255
against [:punct:] in UCP mode.

[ 1 ] Bug #1285413 - CVE-2015-8380 pcre: Heap-based buffer overflow in

This update can be installed with the "yum" update program. Use
su -c 'yum update pcre' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Traut euch!
Neue Nachrichten