vulnerability

SUSE: CVE-2015-3217: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Dec 13, 2016
Added
Dec 13, 2016
Modified
Feb 4, 2022

Description

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.

Solution(s)

suse-upgrade-libpcre1suse-upgrade-libpcre1-32bitsuse-upgrade-libpcre16-0suse-upgrade-libpcrecpp0suse-upgrade-libpcrecpp0-32bitsuse-upgrade-libpcreposix0suse-upgrade-pcre-develsuse-upgrade-pcre-devel-staticsuse-upgrade-pcre-toolssuse-upgrade-sles12-docker-imagesuse-upgrade-sles12sp1-docker-image
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.