[Bug 1025670] Re: Segfault (.bss overflow) in PCRE
Brian Murray
brian at ubuntu.com
Wed Jul 18 22:24:16 UTC 2012
I was unable to create a crash given the command that you provided.
Instead I received an error message ...'character value in \x{...}
sequence is too large'. I also don't see any crash reports about pcre3,
so I think the best thing may just be to wait for the patch to come from
upstream.
Is there a particular reason we should patch pcre3 in Ubuntu to fix
this? Thanks in advance.
** Changed in: pcre3 (Ubuntu)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to pcre3 in Ubuntu.
https://bugs.launchpad.net/bugs/1025670
Title:
Segfault (.bss overflow) in PCRE
Status in “pcre3” package in Ubuntu:
Confirmed
Bug description:
A bug in PCRE was fixed upstream. The issue is a segfault with a
pattern like /\x{300000}/ui, e.g.
pcregrep -ui '\x{300000}' < /dev/null
There was no bounds checking on access to some UCD character tables,
and insufficient bounds checking in \x character construction. The fix
was included in a commit that did a lot of other things:
http://vcs.pcre.org/viewvc?view=revision&revision=774
but I have split out the relevant single-line fix for your
convenience. Patch attached.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pcre3/+bug/1025670/+subscriptions
More information about the foundations-bugs
mailing list