PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Cite this page
CVE-2015-8388. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2015-8388
Use CWE-119, Oracle vendor hub and Linux product page to widen CVE-2015-8388 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2021-3551, CVE-2021-2464 and CVE-2018-17962 for nearby disclosures in the same product family.