diff options
author | Joey Hess <joeyh@debian.org> | 2005-08-29 20:20:17 +0000 |
---|---|---|
committer | Joey Hess <joeyh@debian.org> | 2005-08-29 20:20:17 +0000 |
commit | e86bbe9117eb0a7b1947fb86bc0eeca6d73630d7 (patch) | |
tree | 2e632324e2a16abe17d0671e3570f23a529d19a8 /data/DTSA/advs | |
parent | 5038d37add18c0cf464b59df519155d88ace3250 (diff) |
dsta for pcre3
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1720 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r-- | data/DTSA/advs/10-pcre.adv | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/data/DTSA/advs/10-pcre.adv b/data/DTSA/advs/10-pcre.adv new file mode 100644 index 0000000000..32067cb383 --- /dev/null +++ b/data/DTSA/advs/10-pcre.adv @@ -0,0 +1,14 @@ +dtsa: DTSA-10-1 +source: pcre3 +date: August 29th, 2005 +author: Joey Hess +vuln-type: buffer overflow +problem-scope: remote +debian-specific: no +cve: CAN-2005-2491 +testing-fix: 6.3-0.1etch1 +sid-fix: 6.3-1 + +An integer overflow in pcre_compile.c in Perl Compatible Regular Expressions +(PCRE) allows attackers to execute arbitrary code via quantifier values in +regular expressions, which leads to a heap-based buffer overflow. |