This release fixes CVE-2015-8380 (a heap-based buffer overflow in pcre_exec() when ovector has size 1).
This release fixes a crash when compiling an expression with long (MARK) or (THEN) names. It also fixes compiling a POSIX character class followed by a single ASCII character in a class item while UCP mode is active. It also fixes mismatching characters in the range 128-255 against [:punct:] in UCP mode.
|submitted||2 years ago|
|in testing||2 years ago|
|modified||2 years ago|
|0||0||#1285415 pcre: Heap-based buffer overflow in pcre_exec [fedora-all]|
|0||0||#1285413 CVE-2015-8380 pcre: Heap-based buffer overflow in pcre_exec|
Test results and gating status may sometimes conflict as the gating status is retrieved periodically by Bodhi's backend server, while the test results presented here are retrieved upon page load. If your update is marked as gated while all the tests show green/passed, the next check of gating status should open the gate.