CVE-2016-9643

Priority
Medium
Description
The regex code in Webkit 2.4.11 allows remote attackers to cause a denial
of service (memory consumption) as demonstrated in a large number of ($
(open parenthesis and dollar) followed by {-2,16} and a large number of +)
(plus close parenthesis).
References
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):needs-triage
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 16.10 (Yakkety Yak):needs-triage
Ubuntu 17.04 (Zesty Zapus):needs-triage
Patches:
Package
Upstream:released (2.14.6)
Ubuntu 17.10 (Artful Aardvark):not-affected (2.16.1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.16.1-0ubuntu0.16.04.1)
Ubuntu 16.10 (Yakkety Yak):released (2.16.1-0ubuntu0.16.10.1)
Ubuntu 17.04 (Zesty Zapus):not-affected (2.16.1-1)
Package
Upstream:needed
Ubuntu 17.10 (Artful Aardvark):ignored (no update available)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):ignored (no update available)
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):ignored (no update available)
Ubuntu 16.10 (Yakkety Yak):ignored (no update available)
Ubuntu 17.04 (Zesty Zapus):ignored (no update available)
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was ignored [see notes])
Ubuntu 14.04 LTS (Trusty Tahr):needs-triage
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 16.10 (Yakkety Yak):needs-triage
Ubuntu 17.04 (Zesty Zapus):needs-triage
More Information

Updated: 2017-05-10 22:28:43 UTC (commit 12521)