[Bug 1025670] Re: Segfault (.bss overflow) in PCRE
Tim Starling
tstarling at wikimedia.org
Wed Jul 18 23:29:42 UTC 2012
I have confirmed it in Lucid and Precise. It's possible that it's fixed
already in Quantal. The message you quote is the expected response when
the bug has been fixed (or if the codepoint is more than 7 hexadecimal
digits).
Ubuntu's PHP packages link to libpcre3, and some PHP applications (for
example the one I work on) allow web users to specify PCRE regex
patterns. So it's a DoS vulnerability, and when used with Apache with a
threaded MPM, perhaps it could be used to leak private data from
unrelated web requests. If the patch is backported to Lucid and Precise,
then we'll be able to keep using PCRE from Ubuntu, we won't have to
create our own packages.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to pcre3 in Ubuntu.
https://bugs.launchpad.net/bugs/1025670
Title:
Segfault (.bss overflow) in PCRE
Status in “pcre3” package in Ubuntu:
Confirmed
Bug description:
A bug in PCRE was fixed upstream. The issue is a segfault with a
pattern like /\x{300000}/ui, e.g.
pcregrep -ui '\x{300000}' < /dev/null
There was no bounds checking on access to some UCD character tables,
and insufficient bounds checking in \x character construction. The fix
was included in a commit that did a lot of other things:
http://vcs.pcre.org/viewvc?view=revision&revision=774
but I have split out the relevant single-line fix for your
convenience. Patch attached.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pcre3/+bug/1025670/+subscriptions
More information about the foundations-bugs
mailing list