* [Buildroot] [Bug 763] New: [SECURITY] Update pcre to 7.9
@ 2009-12-02 15:46 bugzilla at busybox.net
2009-12-06 15:30 ` [Buildroot] [Bug 763] " bugzilla at busybox.net
0 siblings, 1 reply; 2+ messages in thread
From: bugzilla at busybox.net @ 2009-12-02 15:46 UTC (permalink / raw)
To: buildroot
https://bugs.busybox.net/show_bug.cgi?id=763
Host: i686-linux
Target: arm-softfloat-linux-uclibcgnueabi
Summary: [SECURITY] Update pcre to 7.9
Product: buildroot
Version: unspecified
Platform: PC
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-
2371
OS/Version: Linux
Status: NEW
Severity: major
Priority: P5
Component: Outdated package
AssignedTo: unassigned at buildroot.uclibc.org
ReportedBy: gustavo at zacarias.com.ar
CC: buildroot at uclibc.org
Estimated Hours: 0.0
Created an attachment (id=795)
--> (https://bugs.busybox.net/attachment.cgi?id=795)
[SECURITY] Bump pcre to 7.9
Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular
Expression (PCRE) library 7.7 allows context-dependent attackers to cause a
denial of service (crash) or possibly execute arbitrary code via a regular
expression that begins with an option and contains multiple branches.
Bump package to version 7.9, remove redundant INSTALL_TARGET and remove
/usr/bin/pcre-config from target.
Should probably remove /usr/bin/pcretest and /usr/bin/pcregrep from target too
for a small size saving.
--
Configure bugmail: https://bugs.busybox.net/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
^ permalink raw reply [flat|nested] 2+ messages in thread
* [Buildroot] [Bug 763] [SECURITY] Update pcre to 7.9
2009-12-02 15:46 [Buildroot] [Bug 763] New: [SECURITY] Update pcre to 7.9 bugzilla at busybox.net
@ 2009-12-06 15:30 ` bugzilla at busybox.net
0 siblings, 0 replies; 2+ messages in thread
From: bugzilla at busybox.net @ 2009-12-06 15:30 UTC (permalink / raw)
To: buildroot
https://bugs.busybox.net/show_bug.cgi?id=763
Peter Korsgaard <jacmet@uclibc.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |FIXED
--- Comment #1 from Peter Korsgaard <jacmet@uclibc.org> 2009-12-06 15:30:20 UTC ---
Committed, thanks
--
Configure bugmail: https://bugs.busybox.net/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2009-12-06 15:30 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2009-12-02 15:46 [Buildroot] [Bug 763] New: [SECURITY] Update pcre to 7.9 bugzilla at busybox.net
2009-12-06 15:30 ` [Buildroot] [Bug 763] " bugzilla at busybox.net
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.