CVE-2014-8964
Publication date 16 December 2014
Last updated 24 July 2024
Ubuntu priority
Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
Status
Package | Ubuntu Release | Status |
---|---|---|
mariadb-10.0 | ||
14.04 LTS trusty | Not in release | |
pcre3 | ||
14.04 LTS trusty |
Fixed 1:8.31-2ubuntu2.1
|
|
Notes
seth-arnold
exploiting this requires allowing untrusted input as the regular expression; that's usually not allowed for performance reasons but the regex engine shouldn't allow overflows on untrusted inputs.
mdeslaur
reproducer in upstream bug does not reproduce in precise
Patch details
Package | Patch details |
---|---|
pcre3 |
References
Related Ubuntu Security Notices (USN)
- USN-2694-1
- PCRE vulnerabilities
- 29 July 2015