| Summary: | pcre new security issue CVE-2015-5073 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/650305/ | ||
| Whiteboard: | MGA5-32-OK advisory | ||
| Source RPM: | pcre-9.37-2.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-06-26 16:29:25 CEST
Before the update, with the attachment to https://bugs.exim.org/show_bug.cgi?id=1651 I got: $ php poc.php Segmentation fault After the update I get: $ php poc.php PHP Warning: preg_match(): Compilation failed: unmatched parentheses at offset 125 in /tmp/poc.php on line 2 Can anyone verify that Mageia 4 is not affected on x86_64? I get this on i586: $ php poc.php PHP Warning: preg_match(): Compilation failed: lookbehind assertion is not fixed length at offset 125 in /tmp/poc.php on line 2 Whiteboard:
(none) =>
MGA5-32-OK Advisory committed to svn. Someone from the sysadmin team please push 16217.adv to updates. Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0267.html Status:
NEW =>
RESOLVED
David Walser
2015-07-06 20:26:04 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/650305/ |