Security Advisories (11)
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
- http://www.pcre.org/changelog.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=384801
- http://security.gentoo.org/glsa/glsa-200711-30.xml
- http://www.redhat.com/support/errata/RHSA-2007-1059.html
- http://www.redhat.com/support/errata/RHSA-2007-1068.html
- http://www.novell.com/linux/security/advisories/2007_62_pcre.html
- http://www.securityfocus.com/bid/26550
- http://secunia.com/advisories/27741
- http://secunia.com/advisories/27773
- http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm
- http://secunia.com/advisories/28041
- http://bugs.gentoo.org/show_bug.cgi?id=198976
- http://security.gentoo.org/glsa/glsa-200801-02.xml
- http://secunia.com/advisories/28406
- http://secunia.com/advisories/28414
- http://security.gentoo.org/glsa/glsa-200801-18.xml
- http://security.gentoo.org/glsa/glsa-200801-19.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:030
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
- http://secunia.com/advisories/28658
- http://secunia.com/advisories/28714
- http://secunia.com/advisories/28720
- http://security.gentoo.org/glsa/glsa-200805-11.xml
- http://secunia.com/advisories/30155
- http://secunia.com/advisories/30219
- http://secunia.com/advisories/30106
- http://www.debian.org/security/2008/dsa-1570
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10911
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
- http://www.debian.org/security/2007/dsa-1399
- http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html
- https://issues.rpath.com/browse/RPL-1738
- http://support.avaya.com/elmodocs2/security/ASA-2007-488.htm
- http://security.gentoo.org/glsa/glsa-200711-30.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:211
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:212
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:213
- http://www.redhat.com/support/errata/RHSA-2007-0967.html
- http://www.redhat.com/support/errata/RHSA-2007-0968.html
- http://www.redhat.com/support/errata/RHSA-2007-1063.html
- http://www.redhat.com/support/errata/RHSA-2007-1065.html
- http://www.novell.com/linux/security/advisories/2007_62_pcre.html
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
- http://www.securityfocus.com/bid/26346
- http://securitytracker.com/id?1018895
- http://secunia.com/advisories/27598
- http://secunia.com/advisories/27538
- http://secunia.com/advisories/27543
- http://secunia.com/advisories/27547
- http://secunia.com/advisories/27554
- http://secunia.com/advisories/27741
- http://secunia.com/advisories/27773
- http://secunia.com/advisories/27697
- http://secunia.com/advisories/27862
- http://secunia.com/advisories/27776
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://secunia.com/advisories/27965
- http://secunia.com/advisories/28136
- http://bugs.gentoo.org/show_bug.cgi?id=198976
- http://security.gentoo.org/glsa/glsa-200801-02.xml
- http://secunia.com/advisories/28406
- http://secunia.com/advisories/28414
- http://security.gentoo.org/glsa/glsa-200801-18.xml
- http://security.gentoo.org/glsa/glsa-200801-19.xml
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
- http://secunia.com/advisories/28658
- http://secunia.com/advisories/28714
- http://secunia.com/advisories/28720
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://secunia.com/advisories/29420
- http://lists.vmware.com/pipermail/security-announce/2008/000014.html
- http://secunia.com/advisories/29785
- http://security.gentoo.org/glsa/glsa-200805-11.xml
- http://secunia.com/advisories/30155
- http://secunia.com/advisories/30219
- http://www.redhat.com/support/errata/RHSA-2008-0546.html
- http://secunia.com/advisories/31124
- https://bugzilla.redhat.com/show_bug.cgi?id=315881
- http://secunia.com/advisories/30106
- http://www.debian.org/security/2008/dsa-1570
- http://www.vupen.com/english/advisories/2007/4238
- http://www.vupen.com/english/advisories/2008/0924/references
- http://www.vupen.com/english/advisories/2008/1234/references
- http://www.vupen.com/english/advisories/2007/3725
- http://www.vupen.com/english/advisories/2007/3790
- http://docs.info.apple.com/article.html?artnum=307562
- http://docs.info.apple.com/article.html?artnum=307179
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38273
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10562
- https://usn.ubuntu.com/547-1/
- http://www.securityfocus.com/archive/1/490917/100/0/threaded
- http://www.securityfocus.com/archive/1/483579/100/0/threaded
- http://www.securityfocus.com/archive/1/483357/100/0/threaded
Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
- http://www.pcre.org/changelog.txt
- http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html
- https://issues.rpath.com/browse/RPL-1738
- http://security.gentoo.org/glsa/glsa-200711-30.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:211
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:212
- http://www.redhat.com/support/errata/RHSA-2007-0967.html
- http://www.redhat.com/support/errata/RHSA-2007-1068.html
- http://www.novell.com/linux/security/advisories/2007_62_pcre.html
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
- http://www.securityfocus.com/bid/26346
- http://securitytracker.com/id?1018895
- http://secunia.com/advisories/27598
- http://secunia.com/advisories/27538
- http://secunia.com/advisories/27543
- http://secunia.com/advisories/27547
- http://secunia.com/advisories/27554
- http://secunia.com/advisories/27741
- http://secunia.com/advisories/27773
- http://secunia.com/advisories/27697
- http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm
- http://docs.info.apple.com/article.html?artnum=307179
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://secunia.com/advisories/28041
- http://secunia.com/advisories/27965
- http://secunia.com/advisories/28136
- http://bugs.gentoo.org/show_bug.cgi?id=198976
- http://security.gentoo.org/glsa/glsa-200801-02.xml
- http://secunia.com/advisories/28406
- http://secunia.com/advisories/28414
- http://security.gentoo.org/glsa/glsa-200801-18.xml
- http://security.gentoo.org/glsa/glsa-200801-19.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:030
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
- http://secunia.com/advisories/28658
- http://secunia.com/advisories/28714
- http://secunia.com/advisories/28720
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
- http://secunia.com/advisories/29267
- http://docs.info.apple.com/article.html?artnum=307562
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://secunia.com/advisories/29420
- http://security.gentoo.org/glsa/glsa-200805-11.xml
- http://secunia.com/advisories/30155
- http://secunia.com/advisories/30219
- http://secunia.com/advisories/30106
- http://www.vupen.com/english/advisories/2007/4238
- http://www.vupen.com/english/advisories/2008/0924/references
- http://www.vupen.com/english/advisories/2007/3725
- http://www.vupen.com/english/advisories/2007/3790
- http://www.debian.org/security/2007/dsa-1399
- http://www.debian.org/security/2008/dsa-1570
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38272
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9725
- https://usn.ubuntu.com/547-1/
- http://www.securityfocus.com/archive/1/483579/100/0/threaded
- http://www.securityfocus.com/archive/1/483357/100/0/threaded
Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns.
- http://www.pcre.org/changelog.txt
- http://www.debian.org/security/2007/dsa-1399
- http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html
- https://issues.rpath.com/browse/RPL-1738
- http://security.gentoo.org/glsa/glsa-200711-30.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:211
- http://www.novell.com/linux/security/advisories/2007_62_pcre.html
- http://www.securityfocus.com/bid/26346
- http://secunia.com/advisories/27538
- http://secunia.com/advisories/27543
- http://secunia.com/advisories/27554
- http://secunia.com/advisories/27741
- http://secunia.com/advisories/27773
- http://secunia.com/advisories/27697
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://secunia.com/advisories/28136
- http://bugs.gentoo.org/show_bug.cgi?id=198976
- http://security.gentoo.org/glsa/glsa-200801-02.xml
- http://secunia.com/advisories/28406
- http://secunia.com/advisories/28414
- http://security.gentoo.org/glsa/glsa-200801-18.xml
- http://security.gentoo.org/glsa/glsa-200801-19.xml
- http://secunia.com/advisories/28714
- http://secunia.com/advisories/28720
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
- http://secunia.com/advisories/29267
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://secunia.com/advisories/29420
- http://security.gentoo.org/glsa/glsa-200805-11.xml
- http://secunia.com/advisories/30155
- http://secunia.com/advisories/30219
- http://secunia.com/advisories/30106
- http://www.debian.org/security/2008/dsa-1570
- http://www.vupen.com/english/advisories/2007/4238
- http://www.vupen.com/english/advisories/2007/3790
- http://www.vupen.com/english/advisories/2007/3725
- http://www.vupen.com/english/advisories/2008/0924/references
- http://docs.info.apple.com/article.html?artnum=307562
- http://docs.info.apple.com/article.html?artnum=307179
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38274
- https://usn.ubuntu.com/547-1/
- http://www.securityfocus.com/archive/1/483579/100/0/threaded
- http://www.securityfocus.com/archive/1/483357/100/0/threaded
Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.
- http://www.pcre.org/changelog.txt
- http://www.debian.org/security/2007/dsa-1399
- http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html
- https://issues.rpath.com/browse/RPL-1738
- http://security.gentoo.org/glsa/glsa-200711-30.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:211
- http://www.securityfocus.com/bid/26346
- http://secunia.com/advisories/27538
- http://secunia.com/advisories/27543
- http://secunia.com/advisories/27554
- http://secunia.com/advisories/27741
- http://secunia.com/advisories/27697
- http://docs.info.apple.com/article.html?artnum=307179
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://secunia.com/advisories/28136
- http://bugs.gentoo.org/show_bug.cgi?id=198976
- http://security.gentoo.org/glsa/glsa-200801-02.xml
- http://secunia.com/advisories/28406
- http://secunia.com/advisories/28414
- http://security.gentoo.org/glsa/glsa-200801-18.xml
- http://security.gentoo.org/glsa/glsa-200801-19.xml
- http://secunia.com/advisories/28714
- http://secunia.com/advisories/28720
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
- http://secunia.com/advisories/29267
- http://docs.info.apple.com/article.html?artnum=307562
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://secunia.com/advisories/29420
- http://security.gentoo.org/glsa/glsa-200805-11.xml
- http://secunia.com/advisories/30155
- http://secunia.com/advisories/30219
- http://secunia.com/advisories/30106
- http://www.debian.org/security/2008/dsa-1570
- http://www.vupen.com/english/advisories/2007/4238
- http://www.vupen.com/english/advisories/2007/3790
- http://www.vupen.com/english/advisories/2007/3725
- http://www.vupen.com/english/advisories/2008/0924/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38275
- https://usn.ubuntu.com/547-1/
- http://www.securityfocus.com/archive/1/483579/100/0/threaded
- http://www.securityfocus.com/archive/1/483357/100/0/threaded
Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.
- http://www.pcre.org/changelog.txt
- http://www.debian.org/security/2007/dsa-1399
- http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html
- https://issues.rpath.com/browse/RPL-1738
- http://security.gentoo.org/glsa/glsa-200711-30.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:211
- http://www.novell.com/linux/security/advisories/2007_62_pcre.html
- http://www.securityfocus.com/bid/26346
- http://secunia.com/advisories/27538
- http://secunia.com/advisories/27543
- http://secunia.com/advisories/27554
- http://secunia.com/advisories/27741
- http://secunia.com/advisories/27773
- http://secunia.com/advisories/27697
- http://docs.info.apple.com/article.html?artnum=307179
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://secunia.com/advisories/28136
- http://bugs.gentoo.org/show_bug.cgi?id=198976
- http://security.gentoo.org/glsa/glsa-200801-02.xml
- http://secunia.com/advisories/28406
- http://secunia.com/advisories/28414
- http://security.gentoo.org/glsa/glsa-200801-18.xml
- http://security.gentoo.org/glsa/glsa-200801-19.xml
- http://secunia.com/advisories/28714
- http://secunia.com/advisories/28720
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
- http://secunia.com/advisories/29267
- http://docs.info.apple.com/article.html?artnum=307562
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://secunia.com/advisories/29420
- http://security.gentoo.org/glsa/glsa-200805-11.xml
- http://secunia.com/advisories/30155
- http://secunia.com/advisories/30219
- http://www.debian.org/security/2008/dsa-1570
- http://secunia.com/advisories/30106
- http://www.vupen.com/english/advisories/2007/4238
- http://www.vupen.com/english/advisories/2007/3790
- http://www.vupen.com/english/advisories/2007/3725
- http://www.vupen.com/english/advisories/2008/0924/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38276
- https://usn.ubuntu.com/547-1/
- http://www.securityfocus.com/archive/1/483579/100/0/threaded
- http://www.securityfocus.com/archive/1/483357/100/0/threaded
Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop or crash) or execute arbitrary code.
- http://www.pcre.org/changelog.txt
- http://www.debian.org/security/2007/dsa-1399
- http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html
- https://issues.rpath.com/browse/RPL-1738
- http://security.gentoo.org/glsa/glsa-200711-30.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:211
- http://www.novell.com/linux/security/advisories/2007_62_pcre.html
- http://www.securityfocus.com/bid/26346
- http://secunia.com/advisories/27538
- http://secunia.com/advisories/27543
- http://secunia.com/advisories/27554
- http://secunia.com/advisories/27741
- http://secunia.com/advisories/27773
- http://secunia.com/advisories/27697
- http://docs.info.apple.com/article.html?artnum=307179
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://secunia.com/advisories/28136
- http://bugs.gentoo.org/show_bug.cgi?id=198976
- http://security.gentoo.org/glsa/glsa-200801-02.xml
- http://secunia.com/advisories/28406
- http://secunia.com/advisories/28414
- http://security.gentoo.org/glsa/glsa-200801-18.xml
- http://security.gentoo.org/glsa/glsa-200801-19.xml
- http://secunia.com/advisories/28714
- http://secunia.com/advisories/28720
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
- http://secunia.com/advisories/29267
- http://docs.info.apple.com/article.html?artnum=307562
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://secunia.com/advisories/29420
- http://security.gentoo.org/glsa/glsa-200805-11.xml
- http://secunia.com/advisories/30155
- http://secunia.com/advisories/30219
- http://secunia.com/advisories/30106
- http://www.debian.org/security/2008/dsa-1570
- http://www.vupen.com/english/advisories/2007/4238
- http://www.vupen.com/english/advisories/2007/3790
- http://www.vupen.com/english/advisories/2007/3725
- http://www.vupen.com/english/advisories/2008/0924/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38277
- https://usn.ubuntu.com/547-1/
- http://www.securityfocus.com/archive/1/483579/100/0/threaded
- http://www.securityfocus.com/archive/1/483357/100/0/threaded
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
- http://www.debian.org/security/2007/dsa-1399
- http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html
- https://issues.rpath.com/browse/RPL-1738
- http://security.gentoo.org/glsa/glsa-200711-30.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:211
- http://www.securityfocus.com/bid/26346
- http://secunia.com/advisories/27538
- http://secunia.com/advisories/27543
- http://secunia.com/advisories/27554
- http://secunia.com/advisories/27741
- http://secunia.com/advisories/27697
- http://www.adobe.com/support/security/bulletins/apsb07-20.html
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.redhat.com/support/errata/RHSA-2007-1126.html
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://www.us-cert.gov/cas/techalerts/TA07-355A.html
- http://securitytracker.com/id?1019116
- http://secunia.com/advisories/28136
- http://secunia.com/advisories/28157
- http://secunia.com/advisories/28161
- http://bugs.gentoo.org/show_bug.cgi?id=198976
- http://security.gentoo.org/glsa/glsa-200801-02.xml
- http://secunia.com/advisories/28406
- http://secunia.com/advisories/28414
- http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml
- http://secunia.com/advisories/28570
- http://security.gentoo.org/glsa/glsa-200801-18.xml
- http://security.gentoo.org/glsa/glsa-200801-19.xml
- http://secunia.com/advisories/28714
- http://secunia.com/advisories/28720
- http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html
- http://secunia.com/advisories/28213
- https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html
- http://secunia.com/advisories/29267
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://secunia.com/advisories/29420
- http://www.adobe.com/support/security/bulletins/apsb08-13.html
- http://security.gentoo.org/glsa/glsa-200805-11.xml
- http://secunia.com/advisories/30155
- http://secunia.com/advisories/30219
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1
- http://secunia.com/advisories/30507
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1
- http://secunia.com/advisories/30840
- http://secunia.com/advisories/30106
- http://www.debian.org/security/2008/dsa-1570
- http://www.vupen.com/english/advisories/2007/4238
- http://www.vupen.com/english/advisories/2007/4258
- http://www.vupen.com/english/advisories/2008/1966/references
- http://www.vupen.com/english/advisories/2008/0924/references
- http://www.vupen.com/english/advisories/2008/1724/references
- http://www.vupen.com/english/advisories/2007/3725
- http://www.vupen.com/english/advisories/2007/3790
- http://docs.info.apple.com/article.html?artnum=307562
- http://docs.info.apple.com/article.html?artnum=307179
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38278
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9701
- https://usn.ubuntu.com/547-1/
- http://www.securityfocus.com/archive/1/483579/100/0/threaded
- http://www.securityfocus.com/archive/1/483357/100/0/threaded
The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.
- https://bugs.exim.org/show_bug.cgi?id=1537
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510
- https://bugzilla.redhat.com/show_bug.cgi?id=1187225
- http://www.openwall.com/lists/oss-security/2015/08/04/3
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834
- http://www.securityfocus.com/bid/76157
- https://bto.bluecoat.com/security-advisory/sa128
README for Date
This module is for packages relating to Dates.
ROLES
Date
The basic "Date" role defines operations applicable to points in time which are of no specific calendar, and deal in abstract times without enforcing a particular base unit or frame of reference.
However, pragmatically all Date modules should be able to convert to and from either Perl epoch seconds or Unix epoch seconds.
Duration
The "Duration" role is similar, but for referring to either the distance between two particular dates, or for calendars which such intervals two dates can be reasonably said to be not related to the date which they refer to, may be "floating" durations of some unit. They may also refer to generic units which do not apply a uniform length of time (by other measures) until they are applied to a particular Date.
That is the plan - in order to be sure that the above roles are truly abstracted from the calendars that they represent, a range of calendars will first be implemented. This will hopefully early on include access to the excellent but bulky DateTime framework.
ROLE IMPLEMENATIONS
Date::Gregorian
The "Date::Gregorian" module, based on the Perl 5 Class::Date, represents dates on the Gregorian calendar. It parses ISO-8601 dates "out of the box", and is very lightweight and pragmatic.
Duration::Gregorian
The "Date::Gregorian" module, based on the Perl 5 Class::Date::Rel, represents dates on the Gregorian calendar. It parses ISO-8601 intervals "out of the box".
DateTime
(planned)
A subclass of Date::Gregorian that is a direct port of the DateTime framework to Perl 6, probably initially using perl5embed.
DateTime::Duration
(planned)
A subclass of Duration::Gregorian that is where DateTime::Duration lives.
Date::Chinese
(planned)
Dates on the Chinese calendar, implemented from first principles. ie, its basic units are lunar months etc :-). It should closely correspond to DateTime::Calendar::Chinese.
Duration::Chinese
(planned)
Durations on the Chinese calendar.
Module Install Instructions
To install Perl6::Pugs, copy and paste the appropriate command in to your terminal.
cpanm Perl6::Pugs
perl -MCPAN -e shell
install Perl6::Pugs
For more information on module installation, please visit the detailed CPAN module installation guide.