Bug 1260674 - php: Multiple vulnerabilities related to PCRE functions
Summary: php: Multiple vulnerabilities related to PCRE functions
Status: CLOSED WONTFIX
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20150824,repor...
Keywords: Security
Depends On: 1260676
Blocks: 1260756
TreeView+ depends on / blocked
 
Reported: 2015-09-07 12:39 UTC by Adam Mariš
Modified: 2019-06-08 20:44 UTC (History)
15 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2015-10-13 12:21:13 UTC


Attachments (Terms of Use)

Description Adam Mariš 2015-09-07 12:39:20 UTC
The pcre_exec() function generates a list of offsets, each consisting of a start and an end position within the subject string. Throughout the code it is often assumed that for each offset, the start position is smaller than or equal to the end position. However, certain regular expressions break this assumption. This can lead to denial-of-service, or possibly to remote code execution.

Upstream report:

https://bugs.php.net/bug.php?id=70345

Upstream patch:

http://git.php.net/?p=php-src.git;a=commit;h=03964892c054d0c736414c10b3edc7a40318b975

Comment 1 Adam Mariš 2015-09-07 12:39:50 UTC
Created php tracking bugs for this issue:

Affects: fedora-all [bug 1260676]

Comment 2 Fedora Update System 2015-09-14 22:20:01 UTC
php-5.6.13-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.

Comment 3 Fedora Update System 2015-09-14 23:18:37 UTC
php-5.6.13-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.

Comment 4 Fedora Update System 2015-09-18 18:44:31 UTC
php-5.6.13-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.