First published: Thu Jun 04 2015(Updated: )
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre | <8.38 | 8.38 |
Pcre Pcre2 | =10.10 | |
Pcre Pcre | =7.8 | |
Pcre Pcre | =8.32 | |
Pcre Pcre | =8.33 | |
Pcre Pcre | =8.34 | |
Pcre Pcre | =8.35 | |
Pcre Pcre | =8.36 | |
Pcre Pcre | =8.37 | |
IBM PowerKVM | =2.1 | |
IBM PowerKVM | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.