vulnerability
SUSE: CVE-2015-3217: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Dec 13, 2016 | Dec 13, 2016 | Feb 4, 2022 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Dec 13, 2016
Added
Dec 13, 2016
Modified
Feb 4, 2022
Description
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
Solution(s)
suse-upgrade-libpcre1suse-upgrade-libpcre1-32bitsuse-upgrade-libpcre16-0suse-upgrade-libpcrecpp0suse-upgrade-libpcrecpp0-32bitsuse-upgrade-libpcreposix0suse-upgrade-pcre-develsuse-upgrade-pcre-devel-staticsuse-upgrade-pcre-toolssuse-upgrade-sles12-docker-imagesuse-upgrade-sles12sp1-docker-image

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.