| Summary: | pcre new security issue CVE-2014-8964 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | herman.viaene, rverschelde, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/626062/ | ||
| Whiteboard: | MGA4-32-OK MGA4-64-OK advisory | ||
| Source RPM: | pcre-8.33-2.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-12-12 19:39:00 CET
The PoC from the upstream bug: http://bugs.exim.org/show_bug.cgi?id=1546 is: echo "a" | pcregrep "((?=(?(?=(?(?=(?(?=())))*))))){2}" - Unfortunately it only produces an error when pcre was compiled with AddressSanitizer. MGA4-64 on HP Probook 6555b
No apparant problems.
Test as described above
$ echo "a" | pcregrep "((?=(?(?=(?(?=(?(?=())))*))))){2}" -
aCC:
(none) =>
herman.viaene Adding OKs based on Herman and my testing. This can be validated. Whiteboard:
(none) =>
MGA4-32-OK MGA4-64-OK Validating, advisory uploaded. Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2014-0534.html Status:
NEW =>
RESOLVED |