[Debian-med-packaging] Bug#778397: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability
Andreas Tille
tille at debian.org
Sat Feb 14 17:06:33 UTC 2015
Hi Luciano,
I can confirm that the problem affects testing and unstable. The
package is not in stable. I have commited a patch in SVN:
https://anonscm.debian.org/viewvc/debian-med/trunk/packages/rcsb-core-wrapper/trunk/debian/patches/regcomp_cert_fix.patch?view=markup
Upstream is in CC of this mail so I'll set "Forwarded:" to the patch. I
can upload in less than 24 hours if you acknowledge.
Kind regards
Andreas.
On Sat, Feb 14, 2015 at 03:29:37PM +0100, Luciano Bello wrote:
> Package: librcsb-core-wrapper
> Severity: important
> Tags: security patch
>
> The security team received a report from the CERT Coordination Center that the
> Henry Spencer regular expressions (regex) library contains a heap overflow
> vulnerability. It looks like this package includes the affected code at that's
> the reason of this bug report.
>
> The patch is available here:
> http://gitweb.dragonflybsd.org/dragonfly.git/blobdiff/4d133046c59a851141519d03553a70e903b3eefc..2841837793bd095a82f477e9c370cfe6cfb3862c:/lib/libc/regex/regcomp.c
>
> Please, can you confirm if the binary packages are affected? Are stable and
> testing affected?
>
> More information, here:
> http://www.kb.cert.org/vuls/id/695940
> https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/
>
> A CVE id has been requested already and the report will be updated with it
> eventually.
>
> Cheers, luciano
>
> _______________________________________________
> Debian-med-packaging mailing list
> Debian-med-packaging at lists.alioth.debian.org
> http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/debian-med-packaging
>
--
http://fam-tille.de
More information about the Debian-med-packaging
mailing list