Описание
PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/xenial | not-affected | |
esm-infra-legacy/trusty | DNE | |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | not-affected | |
vivid | DNE | |
vivid/stable-phone-overlay | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2:8.38-3 |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/xenial | not-affected | 2:8.38-3 |
precise | not-affected | |
precise/esm | not-affected | |
trusty | not-affected | code not present |
trusty/esm | not-affected | code not present |
upstream | released | 8.38 |
vivid | ignored | end of life |
vivid/stable-phone-overlay | ignored | end of life, was pending |
Показывать по
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related pa ...
PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
7.5 High
CVSS2
9.8 Critical
CVSS3