Arch Linux Security Advisory ASA-201903-4
========================================
Severity: Low
Date    : 2019-03-03
CVE-ID  : CVE-2017-11164
Package : pcre
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-351

Summary
======
The package pcre before version 8.43-1 is vulnerable to denial of
service.

Resolution
=========
Upgrade to 8.43-1.

# pacman -Syu "pcre>=8.43-1"

The problem has been fixed upstream in version 8.43.

Workaround
=========
None.

Description
==========
In PCRE 8.41, the OP_KETRMAX feature in the match function in
pcre_exec.c allows stack exhaustion (uncontrolled recursion) when
processing a crafted regular expression.

Impact
=====
A remote attacker can crash the process with a crafted regular
expression.

References
=========
https://seclists.org/oss-sec/2017/q3/111
https://bugzilla.redhat.com/show_bug.cgi?id=1470107
https://security.archlinux.org/CVE-2017-11164

ArchLinux: 201903-4: pcre: denial of service

March 4, 2019

Summary

In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.

Resolution

Upgrade to 8.43-1. # pacman -Syu "pcre>=8.43-1"
The problem has been fixed upstream in version 8.43.

References

https://seclists.org/oss-sec/2017/q3/111 https://bugzilla.redhat.com/show_bug.cgi?id=1470107 https://security.archlinux.org/CVE-2017-11164

Severity
Package : pcre
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-351

Workaround

None.

Related News