CVE-2015-2326

Priority
Description
The pcre_compile2 function in PCRE before 8.37 allows context-dependent
attackers to compile incorrect code and cause a denial of service
(out-of-bounds read) via regular expression with a group containing both a
forward referencing subroutine call and a recursive back reference, as
demonstrated by "((?+1)(\1))/".
Assigned-to
mdeslaur
Notes
tyhicksValgrind detects a 1-byte invalid read on Vivid through Trusty
mdeslaurwas supposed to be fixed in wily (2:8.35-7ubuntu2) but got
reverted in (2:8.35-7ubuntu5) by mistake

CVE-2015-2325_CVE-2015-2326_CVE-2015-3210_CVE-2015-5073.patch
in jessie
Package
Source: pcre3 (LP Ubuntu Debian)
Upstream:needed
Ubuntu 14.04 ESM (Trusty Tahr):released (1:8.31-2ubuntu2.1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (2:8.38-3)
Patches:
Upstream:http://vcs.pcre.org/pcre?view=revision&revision=1529
More Information

Updated: 2020-09-10 04:40:11 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)