CVE-2015-8388

Source
https://cve.org/CVERecord?id=CVE-2015-8388
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2015-8388.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2015-8388
Downstream
Related
Withdrawn
2026-01-27T04:15:13.525938Z
Published
2015-12-02T01:59:12Z
Modified
2026-01-27T04:15:13.525938Z
Summary
[none]
Details

PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

References

Affected packages