Search for packages
| purl | pkg:deb/debian/pcre2@10.21-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-udse-25e2-vfeb | Improper Restriction of Operations within the Bounds of a Memory Buffer The compile_branch function in pcre_compile.c in PCRE and pcre2_compile.c in PCRE2 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542. |
CVE-2016-3191
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T12:42:22.738828+00:00 | Debian Importer | Fixing | VCID-udse-25e2-vfeb | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-13T08:42:38.486300+00:00 | Debian Importer | Fixing | VCID-udse-25e2-vfeb | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-03T07:49:23.826427+00:00 | Debian Importer | Fixing | VCID-udse-25e2-vfeb | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |