ALT-PU-2015-1467-1
Closed vulnerabilities
Modified: 2025-04-12
CVE-2014-8964
Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
- http://advisories.mageia.org/MGASA-2014-0534.html
- http://bugs.exim.org/show_bug.cgi?id=1546
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2015-0330.html
- http://www.exim.org/viewvc/pcre?view=revision&revision=1513
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:002
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:137
- http://www.openwall.com/lists/oss-security/2014/11/21/6
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/71206
- https://bugzilla.redhat.com/show_bug.cgi?id=1166147
- https://security.gentoo.org/glsa/201607-02
- http://advisories.mageia.org/MGASA-2014-0534.html
- http://bugs.exim.org/show_bug.cgi?id=1546
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2015-0330.html
- http://www.exim.org/viewvc/pcre?view=revision&revision=1513
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:002
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:137
- http://www.openwall.com/lists/oss-security/2014/11/21/6
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/71206
- https://bugzilla.redhat.com/show_bug.cgi?id=1166147
- https://security.gentoo.org/glsa/201607-02
Modified: 2024-11-21
CVE-2015-2325
The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html
- https://bugs.exim.org/show_bug.cgi?id=1591
- https://fortiguard.com/zeroday/FG-VD-15-015
- https://www.pcre.org/original/changelog.txt
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html
- https://bugs.exim.org/show_bug.cgi?id=1591
- https://fortiguard.com/zeroday/FG-VD-15-015
- https://www.pcre.org/original/changelog.txt
Modified: 2024-11-21
CVE-2015-2326
The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html
- https://bugs.exim.org/show_bug.cgi?id=1592
- https://fortiguard.com/zeroday/FG-VD-15-016
- https://www.pcre.org/original/changelog.txt
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html
- https://bugs.exim.org/show_bug.cgi?id=1592
- https://fortiguard.com/zeroday/FG-VD-15-016
- https://www.pcre.org/original/changelog.txt
Modified: 2025-04-12
CVE-2015-2328
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- http://rhn.redhat.com/errata/RHSA-2016-1025.html
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- http://www.fortiguard.com/advisory/FG-VD-15-014/
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/74924
- https://bugs.exim.org/show_bug.cgi?id=1515
- https://jira.mongodb.org/browse/SERVER-17252
- http://rhn.redhat.com/errata/RHSA-2016-1025.html
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- http://www.fortiguard.com/advisory/FG-VD-15-014/
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/74924
- https://bugs.exim.org/show_bug.cgi?id=1515
- https://jira.mongodb.org/browse/SERVER-17252
Closed bugs
update to 8.36