PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libpcre32-3": "2:8.38-3", "pcregrep-dbgsym": "2:8.38-3", "libpcre16-3": "2:8.38-3", "libpcrecpp0v5-dbgsym": "2:8.38-3", "libpcre3-dbg": "2:8.38-3", "libpcre3": "2:8.38-3", "libpcre32-3-dbgsym": "2:8.38-3", "libpcre3-udeb": "2:8.38-3", "libpcre3-dev-dbgsym": "2:8.38-3", "libpcre3-dbgsym": "2:8.38-3", "libpcre3-udeb-dbgsym": "2:8.38-3", "pcregrep": "2:8.38-3", "libpcre16-3-dbgsym": "2:8.38-3", "libpcre3-dev": "2:8.38-3", "libpcrecpp0v5": "2:8.38-3" } ] }