pcrejitcompile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libpcre3": "1:8.31-2ubuntu2.1", "libpcrecpp0-dbgsym": "1:8.31-2ubuntu2.1", "libpcre3-udeb": "1:8.31-2ubuntu2.1", "libpcre3-dev-dbgsym": "1:8.31-2ubuntu2.1", "libpcre3-dbgsym": "1:8.31-2ubuntu2.1", "libpcre3-udeb-dbgsym": "1:8.31-2ubuntu2.1", "pcregrep": "1:8.31-2ubuntu2.1", "pcregrep-dbgsym": "1:8.31-2ubuntu2.1", "libpcre3-dbg": "1:8.31-2ubuntu2.1", "libpcrecpp0": "1:8.31-2ubuntu2.1", "libpcre3-dev": "1:8.31-2ubuntu2.1" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libpcre32-3": "2:8.38-3.1", "pcregrep-dbgsym": "2:8.38-3.1", "libpcre16-3": "2:8.38-3.1", "libpcrecpp0v5-dbgsym": "2:8.38-3.1", "libpcre3-dbg": "2:8.38-3.1", "libpcre3": "2:8.38-3.1", "libpcre32-3-dbgsym": "2:8.38-3.1", "libpcre3-udeb": "2:8.38-3.1", "libpcre3-dev-dbgsym": "2:8.38-3.1", "libpcre3-dbgsym": "2:8.38-3.1", "libpcre3-udeb-dbgsym": "2:8.38-3.1", "pcregrep": "2:8.38-3.1", "libpcre16-3-dbgsym": "2:8.38-3.1", "libpcre3-dev": "2:8.38-3.1", "libpcrecpp0v5": "2:8.38-3.1" } ] }