From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:42488) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cxhK1-0007fE-O4 for guix-patches@gnu.org; Mon, 10 Apr 2017 17:58:06 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cxhJy-0002EH-LO for guix-patches@gnu.org; Mon, 10 Apr 2017 17:58:05 -0400 Received: from debbugs.gnu.org ([208.118.235.43]:43446) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1cxhJy-0002E9-Hz for guix-patches@gnu.org; Mon, 10 Apr 2017 17:58:02 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1cxhJy-000418-Bd for guix-patches@gnu.org; Mon, 10 Apr 2017 17:58:02 -0400 Subject: bug#26431: [PATCH 0/2] Fix CVE-2017-7186 in pcre and pcre2 Resent-To: guix-patches@gnu.org Resent-Message-ID: From: ludo@gnu.org (Ludovic =?UTF-8?Q?Court=C3=A8s?=) References: <20170410133936.29955-1-ludo@gnu.org> <87d1cktcx5.fsf@fastmail.com> Date: Mon, 10 Apr 2017 23:57:37 +0200 In-Reply-To: <87d1cktcx5.fsf@fastmail.com> (Marius Bakke's message of "Mon, 10 Apr 2017 19:01:10 +0200") Message-ID: <87k26sdiy6.fsf@gnu.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+kyle=kyleam.com@gnu.org Sender: "Guix-patches" To: Marius Bakke Cc: 26431-done@debbugs.gnu.org Heya, Marius Bakke skribis: > Ludovic Court=C3=A8s writes: > >> Hello, >> >> These patches fix >> in pcre and pcre2 using the upstream patches referenced in the CVE datab= ase. >> >> Ludo'. >> >> Ludovic Court=C3=A8s (2): >> gnu: pcre2: Patch CVE-2017-7186. >> gnu: pcre: Patch CVE-2017-7186. > > Thank you for these! Please add URLs to the upstream fixes in the patch > headers: > > https://vcs.pcre.org/pcre?view=3Drevision&revision=3D1688 > https://vcs.pcre.org/pcre2?view=3Drevision&revision=3D670 Done and pushed, thanks for your quick reply! FWIW there=E2=80=99s still work to do on pcre: $ ./pre-inst-env guix lint -c cve pcre pcre2 gnu/packages/pcre.scm:76:2: pcre@8.40: probably vulnerable to CVE-2017-72= 44, CVE-2017-7245, CVE-2017-7246 Ludo=E2=80=99.