ELSA-2016-1025

ELSA-2016-1025 - pcre security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2016-05-11

Description


[8.32-15.1]
- Fix CVE-2015-2328 (infinite recursion compiling pattern with recursive
reference in a group with indefinite repeat) (bug #1330508)
- Fix CVE-2015-8385 (buffer overflow caused by named forward reference to
duplicate group number) (bug #1330508)
- Fix CVE-2015-8386 (buffer overflow caused by lookbehind assertion)
(bug #1330508)
- Fix CVE-2015-3217 (stack overflow caused by mishandled group empty match)
(bug #1330508)
- Fix CVE-2015-5073 and CVE-2015-8388 (buffer overflow for forward reference
within backward assertion with excess closing parenthesis) (bug #1330508)
- Fix CVE-2015-8391 (inefficient posix character class syntax check)
(bug #1330508)
- Fix CVE-2016-3191 (workspace overflow for (*ACCEPT) with deeply nested
parentheses) (bug #1330508)


Related CVEs


CVE-2016-3191
CVE-2015-8386
CVE-2015-5073
CVE-2015-8388
CVE-2015-2328
CVE-2015-8385
CVE-2015-3217
CVE-2015-8391

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) pcre-8.32-15.el7_2.1.src.rpm7048b12423197dbff9627588bda5287c46f96f39644730a1e3136f12e8509357ELBA-2017-1909ol7_x86_64_latest_archive
pcre-8.32-15.el7_2.1.src.rpm7048b12423197dbff9627588bda5287c46f96f39644730a1e3136f12e8509357ELBA-2017-1909ol7_x86_64_optional_archive
pcre-8.32-15.el7_2.1.src.rpm7048b12423197dbff9627588bda5287c46f96f39644730a1e3136f12e8509357ELBA-2017-1909ol7_x86_64_u2_patch
pcre-8.32-15.el7_2.1.src.rpm7048b12423197dbff9627588bda5287c46f96f39644730a1e3136f12e8509357ELBA-2017-1909ol7_x86_64_u3_base
pcre-8.32-15.el7_2.1.i686.rpmc62d1264663b60b1d1cc4d383ee3b9c27567c2e750095954924130bb9cc398baELBA-2017-1909ol7_x86_64_latest_archive
pcre-8.32-15.el7_2.1.i686.rpmc62d1264663b60b1d1cc4d383ee3b9c27567c2e750095954924130bb9cc398baELBA-2017-1909ol7_x86_64_u2_patch
pcre-8.32-15.el7_2.1.i686.rpmc62d1264663b60b1d1cc4d383ee3b9c27567c2e750095954924130bb9cc398baELBA-2017-1909ol7_x86_64_u3_base
pcre-8.32-15.el7_2.1.x86_64.rpmb524c775b8da6417c9bab0aecf924dc87f3cd556190fab96538fbca4c7ca0978ELBA-2017-1909ol7_x86_64_latest_archive
pcre-8.32-15.el7_2.1.x86_64.rpmb524c775b8da6417c9bab0aecf924dc87f3cd556190fab96538fbca4c7ca0978ELBA-2017-1909ol7_x86_64_u2_patch
pcre-8.32-15.el7_2.1.x86_64.rpmb524c775b8da6417c9bab0aecf924dc87f3cd556190fab96538fbca4c7ca0978ELBA-2017-1909ol7_x86_64_u3_base
pcre-devel-8.32-15.el7_2.1.i686.rpmb9ca33aad8cd0ca0d9455fc3706602a4bb8494440098ab1092b260b873db0db4ELBA-2017-1909ol7_x86_64_latest_archive
pcre-devel-8.32-15.el7_2.1.i686.rpmb9ca33aad8cd0ca0d9455fc3706602a4bb8494440098ab1092b260b873db0db4ELBA-2017-1909ol7_x86_64_u2_patch
pcre-devel-8.32-15.el7_2.1.i686.rpmb9ca33aad8cd0ca0d9455fc3706602a4bb8494440098ab1092b260b873db0db4ELBA-2017-1909ol7_x86_64_u3_base
pcre-devel-8.32-15.el7_2.1.x86_64.rpm1c3f77e89a9eec5a3a20743a6ae502bdec328aea37e6e2a8769bdbb6615e2b8eELBA-2017-1909ol7_x86_64_latest_archive
pcre-devel-8.32-15.el7_2.1.x86_64.rpm1c3f77e89a9eec5a3a20743a6ae502bdec328aea37e6e2a8769bdbb6615e2b8eELBA-2017-1909ol7_x86_64_u2_patch
pcre-devel-8.32-15.el7_2.1.x86_64.rpm1c3f77e89a9eec5a3a20743a6ae502bdec328aea37e6e2a8769bdbb6615e2b8eELBA-2017-1909ol7_x86_64_u3_base
pcre-static-8.32-15.el7_2.1.i686.rpm39640a69f7ff22ca1e7f9bffe2f366a86b09d2cb9fd9171b77a2b1d6a6ee70ccELBA-2017-1909ol7_x86_64_optional_archive
pcre-static-8.32-15.el7_2.1.x86_64.rpmfa51ca652a9e4a5050d1d680ed6c213861ac8a9ccdbd878868a080286ec8fb08ELBA-2017-1909ol7_x86_64_optional_archive
pcre-tools-8.32-15.el7_2.1.x86_64.rpm526766a4b10f1e8dabe6cea5c64ef6c510ef1c196f9b57fdc5e7ebacd62ee8e7ELBA-2017-1909ol7_x86_64_optional_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete