CVE-2017-6004

Priority
Description
The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE
through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version)
allows remote attackers to cause a denial of service (out-of-bounds read
and application crash) via a crafted regular expression.
Notes
Package
Source: pcre3 (LP Ubuntu Debian)
Upstream:released (2:8.39-2.1)
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (2:8.39-3)
Ubuntu 19.04 (Disco Dingo):not-affected (2:8.39-3)
Ubuntu 19.10 (Eoan Ermine):not-affected (2:8.39-3)
Ubuntu 20.04 (Focal Fossa):not-affected (2:8.39-3)
Patches:
Upstream:https://vcs.pcre.org/pcre?view=revision&revision=1680
More Information

Updated: 2019-12-05 19:48:46 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)