PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libpcre3": "1:8.31-2ubuntu2.1", "libpcrecpp0-dbgsym": "1:8.31-2ubuntu2.1", "libpcre3-udeb": "1:8.31-2ubuntu2.1", "libpcre3-dev-dbgsym": "1:8.31-2ubuntu2.1", "libpcre3-dbgsym": "1:8.31-2ubuntu2.1", "libpcre3-udeb-dbgsym": "1:8.31-2ubuntu2.1", "pcregrep": "1:8.31-2ubuntu2.1", "pcregrep-dbgsym": "1:8.31-2ubuntu2.1", "libpcre3-dbg": "1:8.31-2ubuntu2.1", "libpcrecpp0": "1:8.31-2ubuntu2.1", "libpcre3-dev": "1:8.31-2ubuntu2.1" } ] }