group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #36468
[Bug 1690484] Re: pcre2: CVE-2017-7186 and CVE-2016-3191
** Also affects: pcre2 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: pcre2 (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1690484
Title:
pcre2: CVE-2017-7186 and CVE-2016-3191
Status in pcre2 package in Ubuntu:
Fix Released
Status in pcre2 source package in Xenial:
New
Bug description:
CVE-2017-7186
-------------
CVE-2017-7186 is the one known CVE fixed in Debian stretch that still affects Ubuntu 16.04 LTS and 16.10. It was fixed in 17.04 already.
CVE-2016-3191
-------------
CVE-2016-3191 is the one known CVE fixed in Debian stretch that still affects Ubuntu 16.04 LTS. It was fixed in 16.10 and newer already.
"The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542."
https://security-tracker.debian.org/tracker/CVE-2016-3191
https://bugzilla.redhat.com/show_bug.cgi?id=1311503
Fedora patch:
http://pkgs.fedoraproject.org/cgit/rpms/pcre2.git/tree/pcre2-10.21-Fix-workspace-overflow-for-deep-nested-parentheses-w.patch?id=fc9ba26
https://vcs.pcre.org/pcre2?view=revision&revision=489
Testing Done
------------
None
Packaging Info
--------------
The Debian maintainer uses dgit for the pcre packages.
You can run 'dgit clone pcre2' to get the packaging along with the extra metadata that actually describes the changes that were done to the source package. I did this and pushed it to
https://git.launchpad.net/~jbicha/ubuntu/+source/pcre2
But the Debian source package itself does not have a patch system
which makes it much more difficult for us to see what changes were
made and why. I think for maintainability with how Ubuntu packaging
generally works, it makes sense here to switch to 3.0 (quilt).
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pcre2/+bug/1690484/+subscriptions