Ubuntu 2694-1: PCRE vulnerabilities

    Date29 Jul 2015
    CategoryUbuntu
    34
    Posted ByLinuxSecurity Advisories
    PCRE could be made to crash or run programs if it processed a specially-crafted regular expression.
    ==========================================================================
    Ubuntu Security Notice USN-2694-1
    July 29, 2015
    
    pcre3 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 15.04
    - Ubuntu 14.04 LTS
    - Ubuntu 12.04 LTS
    
    Summary:
    
    PCRE could be made to crash or run programs if it processed a
    specially-crafted regular expression.
    
    Software Description:
    - pcre3: Perl 5 Compatible Regular Expression Library
    
    Details:
    
    Michele Spagnuolo discovered that PCRE incorrectly handled certain regular
    expressions. A remote attacker could use this issue to cause applications
    using PCRE to crash, resulting in a denial of service, or possibly execute
    arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-8964)
    
    Kai Lu discovered that PCRE incorrectly handled certain regular
    expressions. A remote attacker could use this issue to cause applications
    using PCRE to crash, resulting in a denial of service, or possibly execute
    arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04.
    (CVE-2015-2325, CVE-2015-2326)
    
    Wen Guanxing discovered that PCRE incorrectly handled certain regular
    expressions. A remote attacker could use this issue to cause applications
    using PCRE to crash, resulting in a denial of service, or possibly execute
    arbitrary code. This issue only affected Ubuntu 15.04. (CVE-2015-3210)
    
    It was discovered that PCRE incorrectly handled certain regular
    expressions. A remote attacker could use this issue to cause applications
    using PCRE to crash, resulting in a denial of service, or possibly execute
    arbitrary code. This issue only affected Ubuntu 12.04 LTS and 14.04 LTS.
    (CVE-2015-5073)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 15.04:
      libpcre3                        2:8.35-3.3ubuntu1.1
    
    Ubuntu 14.04 LTS:
      libpcre3                        1:8.31-2ubuntu2.1
    
    Ubuntu 12.04 LTS:
      libpcre3                        8.12-4ubuntu0.1
    
    After a standard system update you need to restart applications using PCRE,
    such as the Apache HTTP server and Nginx, to make all the necessary
    changes.
    
    References:
      http://www.ubuntu.com/usn/usn-2694-1
      CVE-2014-8964, CVE-2015-2325, CVE-2015-2326, CVE-2015-3210,
      CVE-2015-5073
    
    Package Information:
      https://launchpad.net/ubuntu/+source/pcre3/2:8.35-3.3ubuntu1.1
      https://launchpad.net/ubuntu/+source/pcre3/1:8.31-2ubuntu2.1
      https://launchpad.net/ubuntu/+source/pcre3/8.12-4ubuntu0.1
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":53.49,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.63,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.88,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.