[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2023-1775 --- glib2

ID: oval:org.secpod.oval:def:1601731Date: (C)2023-07-10   (M)2024-04-17
Class: PATCHFamily: unix




Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis. PCRE before 8.38 mishandles the [: and \ substrings in character classes, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror. PCRE before 8.38 mishandles the

Platform:
Amazon Linux AMI
Product:
glib2
Reference:
ALAS-2023-1775
CVE-2015-5073
CVE-2015-8390
CVE-2015-8394
CVE    3
CVE-2015-5073
CVE-2015-8390
CVE-2015-8394
CPE    2
cpe:/o:amazon:linux
cpe:/a:gtk:glib2

© SecPod Technologies