{"id":"RHSA-2016:1025","summary":"Red Hat Security Advisory: pcre security update","modified":"2025-11-22T11:10:16Z","published":"2024-09-13T11:31:58Z","upstream":["CVE-2015-2328","CVE-2015-3217","CVE-2015-5073","CVE-2015-8385","CVE-2015-8386","CVE-2015-8388","CVE-2015-8391","CVE-2016-3191"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1025"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1228283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1237223"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285399"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287629"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1287671"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1311503"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1025.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-2328"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-2328"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2328"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-3217"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-3217"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-3217"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-5073"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-5073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5073"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8385"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8385"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8385"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8386"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8386"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8386"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8388"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8388"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8388"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-8391"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-8391"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8391"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3191"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3191"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3191"}],"affected":[{"package":{"name":"pcre","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/pcre"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/pcre-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-devel","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/pcre-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-static","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/pcre-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-tools","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/pcre-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/pcre"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/pcre-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-devel","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/pcre-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-static","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/pcre-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-tools","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/pcre-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/pcre"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/pcre-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/pcre-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-static","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/pcre-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-tools","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/pcre-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/pcre"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/pcre-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-devel","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/pcre-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-static","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/pcre-static"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}},{"package":{"name":"pcre-tools","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/pcre-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.32-15.el7_2.1"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1025.json"}}],"schema_version":"1.7.3"}