Debian Patches

Status for pcre3/2:8.39-15

Patch Description Author Forwarded Bugs Origin Last update
pcre_info.patch pcre_info Mark Baker <mark@mnb.org.uk> no 2016-07-13
pcregrep.1-patch pcregrep.1-patch Mark Baker <mark@mnb.org.uk> no 2016-07-13
pcreposix.patch pcreposix Mark Baker <mark@mnb.org.uk> no 2016-07-13
PCRE6_compatible_API.patch PCRE6_compatible_API Mark Baker <mark@mnb.org.uk> no 2016-07-13
soname.patch soname
===================================================================
Mark Baker <mark@mnb.org.uk> no 2016-07-13
no_jit_x32_powerpcspe.patch no_jit_x32_powerpcspe Matthew Vernon <matthew@debian.org> no 2016-07-13
Disable_JIT_on_sparc64.patch Disable_JIT_on_sparc64 Matthew Vernon <matthew@debian.org> no 2016-07-13
CVE-2017-6004.patch CVE-2017-6004: crafted regular expression may cause denial of service Salvatore Bonaccorso <carnil@debian.org> not-needed debian upstream upstream, https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch 2017-02-17
upstream-fix-for-cve-2017-7186-upstream- Upstream fix for CVE-2017-7186 (Upstream rev 1688) Fix Unicode property crash for 32-bit characters greater than 0x10ffff. Matthew Vernon <matthew@debian.org> no
patch-from-mariadb-to-fix-stack-frame-si Patch from MariaDB to fix stack frame size detection
This comes via Ondřej Surý <ondrej@debian.org> in #878107. Upstream
don't consider it sufficiently important to fix, but it is causing us
issues.
Matthew Vernon <matthew@debian.org> no 2017-11-30
upstream-patch-fixing-cve-2020-14155.patch upstream patch fixing CVE-2020-14155
This checks the size of the number after (?C as it is read, in order
to avoid integer overflow.
Matthew Vernon <matthew@debian.org> no 2020-06-18

All known versions for source package 'pcre3'

Links