ALT-PU-2016-1611-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-1283
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- FEDORA-2016-65833b5dbc
- FEDORA-2016-65833b5dbc
- FEDORA-2016-f5af8e27ce
- FEDORA-2016-f5af8e27ce
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 79825
- 79825
- 1034555
- 1034555
- SSA:2016-172-02
- SSA:2016-172-02
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://bugs.exim.org/show_bug.cgi?id=1767
- GLSA-201607-02
- GLSA-201607-02
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- https://www.tenable.com/security/tns-2017-14
Modified: 2024-11-21
CVE-2016-3191
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
- RHSA-2016:1025
- RHSA-2016:1025
- http://vcs.pcre.org/pcre?view=revision&revision=1631
- http://vcs.pcre.org/pcre?view=revision&revision=1631
- http://vcs.pcre.org/pcre2?view=revision&revision=489
- http://vcs.pcre.org/pcre2?view=revision&revision=489
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 84810
- 84810
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
- RHSA-2016:1132
- RHSA-2016:1132
- https://bto.bluecoat.com/security-advisory/sa128
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.debian.org/815920
- https://bugs.debian.org/815920
- https://bugs.debian.org/815921
- https://bugs.debian.org/815921
- https://bugs.exim.org/show_bug.cgi?id=1791
- https://bugs.exim.org/show_bug.cgi?id=1791
- https://bugzilla.redhat.com/show_bug.cgi?id=1311503
- https://bugzilla.redhat.com/show_bug.cgi?id=1311503
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
Modified: 2024-11-21
CVE-2017-6004
The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.
- 96295
- 96295
- 1037850
- 1037850
- RHSA-2018:2486
- RHSA-2018:2486
- https://bugs.exim.org/show_bug.cgi?id=2035
- https://bugs.exim.org/show_bug.cgi?id=2035
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- GLSA-201706-11
- GLSA-201706-11
- https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch
- https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch