Bug 1287654

Summary: CVE-2015-8388 pcre: Buffer overflow caused by certain patterns with an unmatched closing parenthesis (8.38/18)
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adam.stokes, andrew, carnil, erik-fedora, jgrulich, jorton, lkundrak, mclasen, mmaslano, ppisar, rcollet, rmeggins, sardella, slawomir, walters, webstack-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: pcre 8.38 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-02-19 20:38:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1237224, 1287655, 1287656, 1287657, 1287658    
Bug Blocks: 1287727    

Description Adam Mariš 2015-12-02 13:35:04 UTC
It was discovered that PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis that contained a backward assertion which itself contained a forward reference, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression.

Comment 1 Adam Mariš 2015-12-02 13:35:57 UTC
Created pcre tracking bugs for this issue:

Affects: fedora-all [bug 1287655]

Comment 2 Adam Mariš 2015-12-02 13:36:06 UTC
Created glib2 tracking bugs for this issue:

Affects: fedora-all [bug 1287657]

Comment 3 Adam Mariš 2015-12-02 13:36:15 UTC
Created mingw-pcre tracking bugs for this issue:

Affects: fedora-all [bug 1287656]
Affects: epel-7 [bug 1287658]

Comment 4 Adam Mariš 2015-12-02 15:23:53 UTC
Corresponds to item 18 in http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup

Comment 5 Petr Pisar 2015-12-02 15:59:56 UTC
Fixed in upstream with:

commit 764692f9aea9eab50fdba6cb537441d8b34c6c37
Author: ph10 <ph10@2f5784b3-3f2a-0410-8824-cb99058d5e15>
Date:   Tue Jun 23 16:34:53 2015 +0000

    Fix buffer overflow for forward reference within backward assertion with exc
ess
    closing parenthesis. Bugzilla 1651.
    
    
    git-svn-id: svn://vcs.exim.org/pcre/code/trunk@1571 2f5784b3-3f2a-0410-8824-
cb99058d5e15

Comment 6 Salvatore Bonaccorso 2015-12-02 21:40:38 UTC
Is this CVE a duplicate of CVE-2015-5073?

Comment 7 Petr Pisar 2015-12-03 14:13:33 UTC
I think it is.

Comment 8 Tomas Hoger 2016-02-19 20:38:38 UTC

*** This bug has been marked as a duplicate of bug 1237223 ***