Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200807-03 ] PCRE: Buffer overflow
Date: Mon, 07 Jul 2008 20:37:57
Message-Id: 200807072235.03287.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200807-03
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: PCRE: Buffer overflow
9 Date: July 07, 2008
10 Bugs: #228091, #230039
11 ID: 200807-03
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A buffer overflow vulnerability has been discovered in PCRE, allowing
19 for the execution of arbitrary code and a Denial of Service.
20
21 Background
22 ==========
23
24 PCRE is a Perl-compatible regular expression library. GLib includes a
25 copy of PCRE.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 dev-libs/libpcre < 7.7-r1 >= 7.7-r1
34 2 dev-libs/glib < 2.16.3-r1 >= 2.16.3-r1
35 < 2.14.0
36 -------------------------------------------------------------------
37 2 affected packages on all of their supported architectures.
38 -------------------------------------------------------------------
39
40 Description
41 ===========
42
43 Tavis Ormandy of the Google Security team reported a heap-based buffer
44 overflow when compiling regular expression patterns containing
45 "Internal Option Settings" such as "(?i)".
46
47 Impact
48 ======
49
50 A remote attacker could exploit this vulnerability by sending a
51 specially crafted regular expression to an application making use of
52 the PCRE library, which could possibly lead to the execution of
53 arbitrary code or a Denial of Service.
54
55 Workaround
56 ==========
57
58 There is no known workaround at this time.
59
60 Resolution
61 ==========
62
63 All PCRE users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-7.7-r1"
67
68 All GLib users should upgrade to the latest version:
69
70 # emerge --sync
71 # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.3-r1"
72
73 References
74 ==========
75
76 [ 1 ] CVE-2008-2371
77 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2371
78
79 Availability
80 ============
81
82 This GLSA and any updates to it are available for viewing at
83 the Gentoo Security Website:
84
85 http://security.gentoo.org/glsa/glsa-200807-03.xml
86
87 Concerns?
88 =========
89
90 Security is a primary focus of Gentoo Linux and ensuring the
91 confidentiality and security of our users machines is of utmost
92 importance to us. Any security concerns should be addressed to
93 security@g.o or alternatively, you may file a bug at
94 http://bugs.gentoo.org.
95
96 License
97 =======
98
99 Copyright 2008 Gentoo Foundation, Inc; referenced text
100 belongs to its owner(s).
101
102 The contents of this document are licensed under the
103 Creative Commons - Attribution / Share Alike license.
104
105 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature