Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.

Bug 1287654

Summary: CVE-2015-8388 pcre: Buffer overflow caused by certain patterns with an unmatched closing parenthesis (8.38/18)
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED DUPLICATE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adam.stokes, andrew, carnil, erik-fedora, jgrulich, jorton, lkundrak, mclasen, mmaslano, ppisar, rcollet, rmeggins, sardella, slawomir, walters, webstack-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: pcre 8.38 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-02-19 20:38:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1237224, 1287655, 1287656, 1287657, 1287658    
Bug Blocks:    

Description Adam Mariš 2015-12-02 13:35:04 UTC
It was discovered that PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis that contained a backward assertion which itself contained a forward reference, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression.

Comment 1 Adam Mariš 2015-12-02 13:35:57 UTC
Created pcre tracking bugs for this issue:

Affects: fedora-all [bug 1287655]

Comment 2 Adam Mariš 2015-12-02 13:36:06 UTC
Created glib2 tracking bugs for this issue:

Affects: fedora-all [bug 1287657]

Comment 3 Adam Mariš 2015-12-02 13:36:15 UTC
Created mingw-pcre tracking bugs for this issue:

Affects: fedora-all [bug 1287656]
Affects: epel-7 [bug 1287658]

Comment 4 Adam Mariš 2015-12-02 15:23:53 UTC
Corresponds to item 18 in http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup

Comment 5 Petr Pisar 2015-12-02 15:59:56 UTC
Fixed in upstream with:

commit 764692f9aea9eab50fdba6cb537441d8b34c6c37
Author: ph10 <ph10@2f5784b3-3f2a-0410-8824-cb99058d5e15>
Date:   Tue Jun 23 16:34:53 2015 +0000

    Fix buffer overflow for forward reference within backward assertion with exc
ess
    closing parenthesis. Bugzilla 1651.
    
    
    git-svn-id: svn://vcs.exim.org/pcre/code/trunk@1571 2f5784b3-3f2a-0410-8824-
cb99058d5e15

Comment 6 Salvatore Bonaccorso 2015-12-02 21:40:38 UTC
Is this CVE a duplicate of CVE-2015-5073?

Comment 7 Petr Pisar 2015-12-03 14:13:33 UTC
I think it is.

Comment 8 Tomas Hoger 2016-02-19 20:38:38 UTC

*** This bug has been marked as a duplicate of bug 1237223 ***