pcre-8.32-15.el7.1

エラータID: AXSA:2016-391:01

Release date: 
Wednesday, May 11, 2016 - 19:17
Subject: 
pcre-8.32-15.el7.1
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

Perl-compatible regular expression library.
PCRE has its own native API, but a set of "wrapper" functions that are based on
the POSIX API are also supplied in the library libpcreposix. Note that this
just provides a POSIX calling interface to PCRE: the regular expressions
themselves still follow Perl syntax and semantics. The header file
for the POSIX-style functions is called pcreposix.h.

Security issues fixed with this release:

CVE-2015-2328
PCRE before 8.36 mishandles the /((?(R)a|(?1))) / pattern and related
patterns with certain recursion, which allows remote attackers to
cause a denial of service (segmentation fault) or possibly have
unspecified other impact via a crafted regular expression, as
demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-3217
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-5073
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-8385
PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and
related patterns with certain forward references, which allows remote
attackers to cause a denial of service (buffer overflow) or possibly
have unspecified other impact via a crafted regular expression, as
demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8386
PCRE before 8.38 mishandles the interaction of lookbehind assertions
and mutually recursive subpatterns, which allows remote attackers to
cause a denial of service (buffer overflow) or possibly have
unspecified other impact via a crafted regular expression, as
demonstrated by a JavaScript RegExp object encountered by Konqueror.
CVE-2015-8388
PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and
related patterns with an unmatched closing parenthesis, which allows
remote attackers to cause a denial of service (buffer overflow) or
possibly have unspecified other impact via a crafted regular
expression, as demonstrated by a JavaScript RegExp object encountered
by Konqueror.
CVE-2015-8391
The pcre_compile function in pcre_compile.c in PCRE before 8.38
mishandles certain [: nesting, which allows remote attackers to cause
a denial of service (CPU consumption) or possibly have unspecified
other impact via a crafted regular expression, as demonstrated by a
JavaScript RegExp object encountered by Konqueror.
CVE-2016-3191
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39
and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns
containing an (*ACCEPT) substring in conjunction with nested
parentheses, which allows remote attackers to execute arbitrary code
or cause a denial of service (stack-based buffer overflow) via a
crafted regular expression, as demonstrated by a JavaScript RegExp
object encountered by Konqueror, aka ZDI-CAN-3542.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. pcre-8.32-15.el7.1.src.rpm
    MD5: d565908c58d0734c1c47532fc39301ed
    SHA-256: f4b41988fa7ce323b323b456da8a3423e89949aebe3aabbfd316a83ff5750871
    Size: 1.34 MB

Asianux Server 7 for x86_64
  1. pcre-8.32-15.el7.1.x86_64.rpm
    MD5: 3da8022ae98f24f3cee596d2ed0361de
    SHA-256: 3b9553a76d8f577815d1d17427e2e1cf1ca808362c00ca24f2b61fb287b56ccf
    Size: 418.73 kB
  2. pcre-devel-8.32-15.el7.1.x86_64.rpm
    MD5: 228fdcdf42537d8bb44d5cf589f11de1
    SHA-256: a6d0682016c8a9f18d4c1c0a0eec7615e91bac60d69fa40086bb4ed3a9fb87f2
    Size: 478.33 kB
  3. pcre-8.32-15.el7.1.i686.rpm
    MD5: b6b9a778960752857019a811265e5c3f
    SHA-256: 7d9ad795a10b79c9c28822f5731635ec97285dcc49ba36183c04d0e6eaacb64f
    Size: 415.92 kB
  4. pcre-devel-8.32-15.el7.1.i686.rpm
    MD5: e8bc0b1c7ccb73b7dcb12d5895dcb89e
    SHA-256: 1083f67bf3c5772a1b81691c969a880743296eb2cea3119e1269e6e5c4417dc1
    Size: 478.34 kB