Fixed
Created: Dec 14, 2015
Updated: Dec 3, 2018
Resolved Date: Dec 24, 2015
Found In Version: 6.0.0.26
Fix Version: 6.0.0.27
Severity: Standard
Applicable for: Wind River Linux 6
Component/s: Userspace
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2328
Reproduce
=========
root@qemu14:/# ./pcretest
PCRE version 8.33 2013-05-28
re> /((?(R)a|(?1)))*/
pcretest[2024]: segfault at 7ffd34288ff8 ip 00000031c0401827 sp 00007ffd34289000 error 6 in libpcre.so.1.2.1[31c0400000+27000]
Segmentation fault
Verify
=======
root@qemu14:/# rpm -ivh libpcre1-8.33-r1.7.x86_64.rpm
Preparing... ########################################### [100%]
1:libpcre1 ########################################### [100%]
root@qemu14:/# ./pcretest
PCRE version 8.33 2013-05-28
re> /((?(R)a|(?1)))*/
data> abcd
0: a
1: a
data>