GLSA-200807-03 : PCRE: Buffer overflow
High Nessus Plugin ID 33460
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200807-03 (PCRE: Buffer overflow)
Tavis Ormandy of the Google Security team reported a heap-based buffer overflow when compiling regular expression patterns containing 'Internal Option Settings' such as '(?i)'.
A remote attacker could exploit this vulnerability by sending a specially crafted regular expression to an application making use of the PCRE library, which could possibly lead to the execution of arbitrary code or a Denial of Service.
There is no known workaround at this time.
SolutionAll PCRE users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-libs/libpcre-7.7-r1' All GLib users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-libs/glib-2.16.3-r1'