Debian Pcre3 vulnerabilities
52 known vulnerabilities affecting debian/pcre3.
Total CVEs
52
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL9HIGH12MEDIUM11LOW20
Vulnerabilities
Page 1 of 3
CVE-2020-14155MEDIUMCVSS 5.3fixed in pcre3 2:8.39-13 (bookworm)2020
CVE-2020-14155 [MEDIUM] CVE-2020-14155: pcre3 - libpcre in PCRE before 8.44 allows an integer overflow via a large number after ...
libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
Scope: local
bookworm: resolved (fixed in 2:8.39-13)
bullseye: resolved (fixed in 2:8.39-13)
debian
CVE-2019-20838LOWCVSS 7.52019
CVE-2019-20838 [HIGH] CVE-2019-20838: pcre3 - libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is...
libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.
Scope: local
bookworm: open
bullseye: open
debian
CVE-2017-6004HIGHCVSS 7.5fixed in pcre3 2:8.39-2.1 (bookworm)2017
CVE-2017-6004 [HIGH] CVE-2017-6004: pcre3 - The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through ...
The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.
Scope: local
bookworm: resolved (fixed in 2:8.39-2.1)
bullseye: resolved (fixed in 2:8.39-2.1)
debian
CVE-2017-7186HIGHCVSS 7.5fixed in pcre2 10.22-3 (bookworm)2017
CVE-2017-7186 [HIGH] CVE-2017-7186: pcre2 - libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to caus...
libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.
Scope: local
bookworm: resolved (fixed in 10.22-3)
bullseye: resolved (fixed in 10.22-3)
forky: resolved (fixed in 10.22-3)
sid: resolved (fixed in 10.22-3)
debian
CVE-2017-7244MEDIUMCVSS 5.5fixed in pcre3 2:8.39-3 (bookworm)2017
CVE-2017-7244 [MEDIUM] CVE-2017-7244: pcre3 - The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows rem...
The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.
Scope: local
bookworm: resolved (fixed in 2:8.39-3)
bullseye: resolved (fixed in 2:8.39-3)
debian
CVE-2017-16231LOWCVSS 5.52017
CVE-2017-16231 [MEDIUM] CVE-2017-16231: pcre3 - In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflo...
In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used
Scope: local
bookworm: open
bullseye: open
debian
CVE-2017-11164LOWCVSS 7.52017
CVE-2017-11164 [HIGH] CVE-2017-11164: pcre3 - In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows...
In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.
Scope: local
bookworm: open
bullseye: open
debian
CVE-2017-7246LOWCVSS 7.82017
CVE-2017-7246 [HIGH] CVE-2017-7246: pcre3 - Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c ...
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.
Scope: local
bookworm: open
bullseye: open
debian
CVE-2017-7245LOWCVSS 7.82017
CVE-2017-7245 [HIGH] CVE-2017-7245: pcre3 - Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c ...
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.
Scope: local
bookworm: open
bullseye: open
debian
CVE-2016-3191CRITICALCVSS 9.8fixed in pcre2 10.21-1 (bookworm)2016
CVE-2016-3191 [CRITICAL] CVE-2016-3191: pcre2 - The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_...
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrat
debian
CVE-2016-1283LOWCVSS 9.8fixed in pcre3 2:8.38-3.1 (bookworm)2016
CVE-2016-1283 [CRITICAL] CVE-2016-1283: pcre2 - The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?...
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecifi
debian
CVE-2015-8394CRITICALCVSS 9.8fixed in pcre3 2:8.38-1 (bookworm)2015
CVE-2015-8394 [CRITICAL] CVE-2015-8394: pcre3 - PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which...
PCRE before 8.38 mishandles the (?() and (?(R) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Scope: local
bookworm: resolved (fixed in 2:8.38-1)
bullseye: resolved (fixed in 2:
debian
CVE-2015-8389CRITICALCVSS 9.8fixed in pcre3 2:8.38-1 (bookworm)2015
CVE-2015-8389 [CRITICAL] CVE-2015-8389: pcre3 - PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, wh...
PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Scope: local
bookworm: resolved (fixed in 2:8.38-1)
bullseye:
debian
CVE-2015-8390CRITICALCVSS 9.8fixed in pcre3 2:8.38-1 (bookworm)2015
CVE-2015-8390 [CRITICAL] CVE-2015-8390: pcre3 - PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which...
PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Scope: local
bookworm: resolved (fixed in 2:8.38-1)
bullse
debian
CVE-2015-8391CRITICALCVSS 9.8fixed in pcre3 2:8.38-1 (bookworm)2015
CVE-2015-8391 [CRITICAL] CVE-2015-8391: pcre3 - The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certa...
The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Scope: local
bookworm: resolved (fixed in 2:8.38
debian
CVE-2015-5073CRITICALCVSS 9.1fixed in pcre3 2:8.35-7 (bookworm)2015
CVE-2015-5073 [CRITICAL] CVE-2015-5073: pcre3 - Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in...
Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
Scope: local
bookworm: resolved (fixed in
debian
CVE-2015-8383CRITICALCVSS 9.8fixed in pcre3 2:8.38-1 (bookworm)2015
CVE-2015-8383 [CRITICAL] CVE-2015-8383: pcre3 - PCRE before 8.38 mishandles certain repeated conditional groups, which allows re...
PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Scope: local
bookworm: resolved (fixed in 2:8.38-1)
bullseye: resolved (fixed
debian
CVE-2015-8386CRITICALCVSS 9.8fixed in pcre3 2:8.38-1 (bookworm)2015
CVE-2015-8386 [CRITICAL] CVE-2015-8386: pcre3 - PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutuall...
PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Scope: local
bookworm: resolved (fixed
debian
CVE-2015-3210CRITICALCVSS 9.8fixed in pcre3 2:8.35-7.2 (bookworm)2015
CVE-2015-3210 [CRITICAL] CVE-2015-3210: pcre3 - Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remo...
Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?Pc)(?Pa(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
Scope: local
bookworm: resolved (fixed in 2:8.35-7.2)
bullseye: resolved (fixed in 2:8.35-7.2)
debian
CVE-2015-8384HIGHCVSS 7.5fixed in pcre3 2:8.35-7.2 (bookworm)2015
CVE-2015-8384 [HIGH] CVE-2015-8384: pcre3 - PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patt...
PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE
debian
1 / 3Next →