Описание
PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | DNE | |
precise | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid | DNE | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
wily | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2:8.38-3 |
esm-infra-legacy/trusty | not-affected | 1:8.31-2ubuntu2.1 |
precise | released | 8.12-4ubuntu0.1 |
trusty | released | 1:8.31-2ubuntu2.1 |
trusty/esm | not-affected | 1:8.31-2ubuntu2.1 |
upstream | released | 2:8.35-7 |
vivid | released | 2:8.35-3.3ubuntu1.1 |
vivid/stable-phone-overlay | released | 2:8.35-3.3ubuntu1.1 |
vivid/ubuntu-core | released | 2:8.35-3.3ubuntu1.1 |
wily | released | 2:8.35-7.1ubuntu1.3 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and ...
PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
EPSS
7.5 High
CVSS2