Описание
PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/xenial | not-affected | |
esm-infra-legacy/trusty | DNE | |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid | DNE | |
vivid/stable-phone-overlay | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2:8.38-3 |
esm-infra-legacy/trusty | not-affected | 1:8.31-2ubuntu2.2 |
esm-infra/xenial | not-affected | 2:8.38-3 |
precise | released | 8.12-4ubuntu0.2 |
precise/esm | not-affected | 8.12-4ubuntu0.2 |
trusty | released | 1:8.31-2ubuntu2.2 |
trusty/esm | not-affected | 1:8.31-2ubuntu2.2 |
upstream | released | 8.38 |
vivid | ignored | end of life |
vivid/stable-phone-overlay | ignored | end of life, was pending |
Показывать по
EPSS
7.5 High
CVSS2
7.3 High
CVSS3
Связанные уязвимости
PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.38 mishandles (?123) subroutine calls and related subrou ...
PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
EPSS
7.5 High
CVSS2
7.3 High
CVSS3