Show plain JSON{"affected_release": [{"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-0:2.3-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-0:5.6.25-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-pear-1:1.9.5-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-0:2.3-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-0:5.6.25-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-pear-1:1.9.5-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-0:2.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-0:5.6.25-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-pear-1:1.9.5-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-0:2.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-0:5.6.25-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-pear-1:1.9.5-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-0:2.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-0:5.6.25-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-pear-1:1.9.5-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS", "release_date": "2016-11-15T00:00:00Z"}], "bugzilla": {"description": "pcre: Buffer overflow caused by repeated conditional group (8.38/3)", "id": "1287614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287614"}, "csaw": false, "cvss": {"cvss_base_score": "6.8", "cvss_scoring_vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "status": "verified"}, "cwe": "CWE-120", "details": ["PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror."], "name": "CVE-2015-8383", "package_state": [{"cpe": "cpe:/a:redhat:directory_server:8", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Directory Server 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:5", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Enterprise Linux 5"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "glib2", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "glib2", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "virtuoso-opensource", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1", "fix_state": "Not affected", "package_name": "httpd", "product_name": "Red Hat JBoss Enterprise Web Server 1"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2", "fix_state": "Not affected", "package_name": "httpd", "product_name": "Red Hat JBoss Enterprise Web Server 2"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat JBoss Enterprise Web Server 3"}, {"cpe": "cpe:/a:redhat:rhel_software_collections:2", "fix_state": "Not affected", "package_name": "php54-php", "product_name": "Red Hat Software Collections"}, {"cpe": "cpe:/a:redhat:rhel_software_collections:2", "fix_state": "Not affected", "package_name": "php55-php", "product_name": "Red Hat Software Collections"}, {"cpe": "cpe:/a:redhat:rhel_software_collections:2", "fix_state": "Not affected", "package_name": "rh-mariadb101-mariadb", "product_name": "Red Hat Software Collections"}], "public_date": "2015-11-23T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2015-8383\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-8383"], "threat_severity": "Important"}