Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2016:3099-1

Опубликовано: 12 дек. 2016
Источник: suse-cvrf

Описание

Security update for pcre

This update for pcre to version 8.39 (bsc#972127) fixes several issues.

If you use pcre extensively please be aware that this is an update to a new version. Please make sure that your software works with the updated version.

This version fixes a number of vulnerabilities that affect pcre and applications using the libary when accepting untrusted input as regular expressions or as part thereof. Remote attackers could have caused the application to crash, disclose information or potentially execute arbitrary code. These security issues were fixed:

  • CVE-2014-8964: Heap-based buffer overflow in PCRE allowed remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats (bsc#906574).
  • CVE-2015-2325: Heap buffer overflow in compile_branch() (bsc#924960).
  • CVE-2015-3210: Heap buffer overflow in pcre_compile2() / compile_regex() (bsc#933288)
  • CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() (bsc#933878).
  • CVE-2015-5073: Library Heap Overflow Vulnerability in find_fixedlength() (bsc#936227).
  • bsc#942865: heap overflow in compile_regex()
  • CVE-2015-8380: The pcre_exec function in pcre_exec.c mishandled a // pattern with a \01 string, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957566).
  • CVE-2015-2327: PCRE mishandled certain patterns with internal recursive back references, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957567).
  • bsc#957598: Various security issues
  • CVE-2015-8381: Heap Overflow in compile_regex() (bsc#957598).
  • CVE-2015-8382: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)(bsc#957598).
  • CVE-2015-8383: Buffer overflow caused by repeated conditional group(bsc#957598).
  • CVE-2015-8384: Buffer overflow caused by recursive back reference by name within certain group(bsc#957598).
  • CVE-2015-8385: Buffer overflow caused by forward reference by name to certain group(bsc#957598).
  • CVE-2015-8386: Buffer overflow caused by lookbehind assertion(bsc#957598).
  • CVE-2015-8387: Integer overflow in subroutine calls(bsc#957598).
  • CVE-2015-8388: Buffer overflow caused by certain patterns with an unmatched closing parenthesis(bsc#957598).
  • CVE-2015-8389: Infinite recursion in JIT compiler when processing certain patterns(bsc#957598).
  • CVE-2015-8390: Reading from uninitialized memory when processing certain patterns(bsc#957598).
  • CVE-2015-8391: Some pathological patterns causes pcre_compile() to run for a very long time(bsc#957598).
  • CVE-2015-8392: Buffer overflow caused by certain patterns with duplicated named groups(bsc#957598).
  • CVE-2015-8393: Information leak when running pcgrep -q on crafted binary(bsc#957598).
  • CVE-2015-8394: Integer overflow caused by missing check for certain conditions(bsc#957598).
  • CVE-2015-8395: Buffer overflow caused by certain references(bsc#957598).
  • CVE-2015-2328: PCRE mishandled the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression (bsc#957600).
  • CVE-2016-1283: The pcre_compile2 function in pcre_compile.c in PCRE mishandled certain patterns with named subgroups, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression (bsc#960837).
  • CVE-2016-3191: The compile_branch function in pcre_compile.c in pcre2_compile.c mishandled patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression (bsc#971741).

These non-security issues were fixed:

  • JIT compiler improvements
  • performance improvements
  • The Unicode data tables have been updated to Unicode 7.0.0.

This update was imported from the SUSE:SLE-12:Update update project.

Список пакетов

openSUSE Leap 42.1
libpcre1-8.39-6.1
libpcre1-32bit-8.39-6.1
libpcre16-0-8.39-6.1
libpcre16-0-32bit-8.39-6.1
libpcrecpp0-8.39-6.1
libpcrecpp0-32bit-8.39-6.1
libpcreposix0-8.39-6.1
libpcreposix0-32bit-8.39-6.1
pcre-8.39-6.1
pcre-devel-8.39-6.1
pcre-devel-static-8.39-6.1
pcre-doc-8.39-6.1
pcre-tools-8.39-6.1
openSUSE Leap 42.2
libpcre1-8.39-6.1
libpcre1-32bit-8.39-6.1
libpcre16-0-8.39-6.1
libpcre16-0-32bit-8.39-6.1
libpcrecpp0-8.39-6.1
libpcrecpp0-32bit-8.39-6.1
libpcreposix0-8.39-6.1
libpcreposix0-32bit-8.39-6.1
pcre-8.39-6.1
pcre-devel-8.39-6.1
pcre-devel-static-8.39-6.1
pcre-doc-8.39-6.1
pcre-tools-8.39-6.1

Описание

Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки

Описание

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.


Затронутые продукты
openSUSE Leap 42.1:libpcre1-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre1-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-32bit-8.39-6.1
openSUSE Leap 42.1:libpcre16-0-8.39-6.1

Ссылки
Уязвимость openSUSE-SU-2016:3099-1