*** This bug is a security vulnerability ***

Public security bug reported:

CVE-2017-7186
-------------
CVE-2017-7186 is the one known CVE fixed in Debian stretch that still affects 
Ubuntu 16.04 LTS and 16.10. It was fixed in 17.04 already.


CVE-2016-3191
-------------
CVE-2016-3191 is the one known CVE fixed in Debian stretch that still affects 
Ubuntu 16.04 LTS. It was fixed in 16.10 and newer already.


"The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and 
pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an 
(*ACCEPT) substring in conjunction with nested parentheses, which allows remote 
attackers to execute arbitrary code or cause a denial of service (stack-based 
buffer overflow) via a crafted regular expression, as demonstrated by a 
JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542."

https://security-tracker.debian.org/tracker/CVE-2016-3191

https://bugzilla.redhat.com/show_bug.cgi?id=1311503
Fedora patch:
http://pkgs.fedoraproject.org/cgit/rpms/pcre2.git/tree/pcre2-10.21-Fix-workspace-overflow-for-deep-nested-parentheses-w.patch?id=fc9ba26

https://vcs.pcre.org/pcre2?view=revision&revision=489

Testing Done
------------
None

Packaging Info
--------------
The Debian maintainer uses dgit for the pcre packages.

You can run 'dgit clone pcre2' to get the packaging along with the extra 
metadata that actually describes the changes that were done to the source 
package. I did this and pushed it to
https://git.launchpad.net/~jbicha/ubuntu/+source/pcre2

But the Debian source package itself does not have a patch system which
makes it much more difficult for us to see what changes were made and
why. I think for maintainability with how Ubuntu packaging generally
works, it makes sense here to switch to 3.0 (quilt).

** Affects: pcre2 (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: xenial yakkety

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-7186

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3191

** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1690484

Title:
  pcre2: CVE-2017-7186 and CVE-2016-3191

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pcre2/+bug/1690484/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to