USN-2943-1: PCRE vulnerabilities
29 March 2016
PCRE could be made to crash or run programs if it processed a specially-crafted regular expression.
Releases
Packages
- pcre3 - Perl 5 Compatible Regular Expression Library
Details
It was discovered that PCRE incorrectly handled certain regular
expressions. A remote attacker could use this issue to cause applications
using PCRE to crash, resulting in a denial of service, or possibly execute
arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10
Ubuntu 14.04
Ubuntu 12.04
After a standard system update you need to restart applications using PCRE,
such as the Apache HTTP server and Nginx, to make all the necessary
changes.
References
- CVE-2014-9769
- CVE-2015-2325
- CVE-2015-2326
- CVE-2015-2327
- CVE-2015-2328
- CVE-2015-3210
- CVE-2015-5073
- CVE-2015-8380
- CVE-2015-8381
- CVE-2015-8382
- CVE-2015-8383
- CVE-2015-8384
- CVE-2015-8385
- CVE-2015-8386
- CVE-2015-8387
- CVE-2015-8388
- CVE-2015-8389
- CVE-2015-8390
- CVE-2015-8391
- CVE-2015-8392
- CVE-2015-8393
- CVE-2015-8394
- CVE-2015-8395
- CVE-2016-1283
- CVE-2016-3191
Related notices
- USN-2694-1: libpcre3, libpcre3-udeb, libpcrecpp0, pcre3, libpcre3-dev, pcregrep