PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libpcre32-3": "2:8.38-3", "pcregrep-dbgsym": "2:8.38-3", "libpcre16-3": "2:8.38-3", "libpcrecpp0v5-dbgsym": "2:8.38-3", "libpcre3-dbg": "2:8.38-3", "libpcre3": "2:8.38-3", "libpcre32-3-dbgsym": "2:8.38-3", "libpcre3-udeb": "2:8.38-3", "libpcre3-dev-dbgsym": "2:8.38-3", "libpcre3-dbgsym": "2:8.38-3", "libpcre3-udeb-dbgsym": "2:8.38-3", "pcregrep": "2:8.38-3", "libpcre16-3-dbgsym": "2:8.38-3", "libpcre3-dev": "2:8.38-3", "libpcrecpp0v5": "2:8.38-3" } ] }