Acknowledged
Created: Jan 13, 2016
Updated: May 29, 2018
Found In Version: 7.0.0.12
Severity: Standard
Applicable for: Wind River Linux 7
Component/s: Userspace
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1283