Bug 315871 (CVE-2007-1659) - CVE-2007-1659 pcre regular expression flaws
Summary: CVE-2007-1659 pcre regular expression flaws
Alias: CVE-2007-1659
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 315951 315961 378401 378411 380511 380521 411731 413871 414271
Blocks: 307451
TreeView+ depends on / blocked
Reported: 2007-10-02 19:32 UTC by Josh Bressers
Modified: 2021-02-25 17:52 UTC (History)
4 users (show)

Fixed In Version: 7.3-3.fc7
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2008-03-06 16:36:45 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0967 0 normal SHIPPED_LIVE Critical: pcre security update 2007-11-05 16:46:02 UTC
Red Hat Product Errata RHSA-2007:1068 0 normal SHIPPED_LIVE Important: pcre security update 2007-11-29 15:09:39 UTC

Description Josh Bressers 2007-10-02 19:32:47 UTC
Tavis Ormandy of the Google Security Team reported multiple pcre regular
expressions flaws.  Here are the details pasted from Tavis' mail:

unmatched \Q\E sequences with orphan \E codes can cause the compiled
regex to become desynchronized, resulting in corrupt bytecode that may
result in multiple exploitable conditions. This was inadvertently
fixed by the pcre maintainer in version 7.0, however another case of a
lone \E inside a character class remained, this has been fixed in 7.3


Red Hat would like to thank Tavis Ormandy and Will Drewry for properly disclosing these issues.

Comment 6 Josh Bressers 2007-11-05 15:57:51 UTC
Lifting embargo

Comment 11 Red Hat Product Security 2008-01-14 13:36:03 UTC
This issue was addressed in:

Red Hat Enterprise Linux:

Comment 12 Fedora Update System 2008-02-15 16:34:32 UTC
pcre-7.3-3.fc7 has been submitted as an update for Fedora 7

Comment 13 Fedora Update System 2008-03-06 16:36:21 UTC
pcre-7.3-3.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.