Bug 55897 - pcre2: Multiple issues (5.0)
pcre2: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-3-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2023-03-21 07:23 CET by Quality Assurance
Modified: 2023-03-22 13:58 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2023-03-21 07:23:37 CET
New Debian pcre2 10.32-5+deb10u1 fixes:
This update addresses the following issues:
* Out of bounds read in JIT mode when \X is used in non-UTF mode  (CVE-2019-20454)
* Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c  (CVE-2022-1586)
* Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c  (CVE-2022-1587)
Comment 1 Quality Assurance univentionstaff 2023-03-21 08:00:12 CET
--- mirror/ftp/pool/main/p/pcre2/pcre2_10.32-5.dsc
+++ apt/ucs_5.0-0-errata5.0-3/source/pcre2_10.32-5+deb10u1.dsc
@@ -1,3 +1,17 @@
+10.32-5+deb10u1 [Thu, 16 Mar 2023 01:21:36 +0100] Guilhem Moulin <guilhem@debian.org>:
+
+  * Non-maintainer upload by the LTS Security Team.
+  * CVE-2019-20454: Out-of-bounds read when the pattern \X is JIT compiled and
+    used to match specially crafted subjects in non-UTF mode.
+  * CVE-2022-1586: Out-of-bounds read involving unicode property matching in
+    JIT-compiled regular expressions. The issue occurs because the character
+    was not fully read in case-less matching within JIT. (Closes: #1011954).
+  * CVE-2022-1587: Out-of-bounds read affecting recursions in JIT-compiled
+    regular expressions caused by duplicate data transfers. (Closes:
+    #1011954).
+  * Subject buffer overread in JIT when UTF is disabled and \X or \R has a
+    greater than 1 fixed quantifier.
+
 10.32-5 [Mon, 25 Mar 2019 19:56:19 +0000] Matthew Vernon <matthew@debian.org>:
 
   * Patch from Guillem Jover <guillem@debian.org> to only use SSE2

<http://piuparts.knut.univention.de/5.0-3/#1394833337892008324>
Comment 2 Philipp Hahn univentionstaff 2023-03-22 11:07:59 CET
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-3] 31f42dc3f4 Bug #55897: pcre2 10.32-5+deb10u1
 doc/errata/staging/pcre2.yaml | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

[5.0-3] 9497fbf779 Bug #55897: pcre2 10.32-5+deb10u1
 doc/errata/staging/pcre2.yaml | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)