PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://github.com/ARPSyndicate/cvemon
- https://github.com/RedHatSatellite/satellite-host-cve
- https://github.com/marklogic/marklogic-docker
- https://github.com/marklogic/marklogic-kubernetes