Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.

Bug 1287702 (CVE-2015-8394)

Summary: CVE-2015-8394 pcre: Integer overflow caused by missing check for certain conditions (8.38/31)
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: unspecifiedCC: adam.stokes, andrew, carnil, erik-fedora, jgrulich, jorton, lkundrak, mclasen, mmaslano, pmyers, ppisar, rcollet, rmeggins, sardella, slawomir, walters, webstack-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: pcre 8.38 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-02-18 21:01:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1287703, 1287704, 1287705, 1287706    
Bug Blocks:    

Description Adam Mariš 2015-12-02 14:08:14 UTC
It was found that PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression.

Comment 1 Adam Mariš 2015-12-02 14:08:59 UTC
Created pcre tracking bugs for this issue:

Affects: fedora-all [bug 1287703]

Comment 2 Adam Mariš 2015-12-02 14:09:08 UTC
Created glib2 tracking bugs for this issue:

Affects: fedora-all [bug 1287705]

Comment 3 Adam Mariš 2015-12-02 14:09:15 UTC
Created mingw-pcre tracking bugs for this issue:

Affects: fedora-all [bug 1287704]
Affects: epel-7 [bug 1287706]

Comment 4 Adam Mariš 2015-12-02 15:24:50 UTC
Corresponds to item 31 in http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup

Comment 5 Petr Pisar 2015-12-02 16:13:50 UTC
Fixed in upstream with:

commit b35246ac4badf9c2a99b21b214998361babd7afb
Author: ph10 <ph10@2f5784b3-3f2a-0410-8824-cb99058d5e15>
Date:   Mon Aug 10 14:19:06 2015 +0000

    Add missing integer overflow checks.
    
    
    git-svn-id: svn://vcs.exim.org/pcre/code/trunk@1589 2f5784b3-3f2a-0410-8824-
cb99058d5e15

Comment 6 Fedora Update System 2016-01-04 19:55:15 UTC
pcre-8.38-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.

Comment 7 Tomas Hoger 2016-02-18 20:59:14 UTC
(In reply to Petr Pisar from comment #5)
> commit b35246ac4badf9c2a99b21b214998361babd7afb
> Author: ph10 <ph10@2f5784b3-3f2a-0410-8824-cb99058d5e15>
> Date:   Mon Aug 10 14:19:06 2015 +0000
> 
> Add missing integer overflow checks.

Upstream commit link:

http://vcs.pcre.org/pcre?view=revision&revision=1589

Comment 8 Tomas Hoger 2016-02-18 21:01:12 UTC
This integer overflow does not seem to have any security impact, similar to bug 1287646 comment 8.