CVE-2016-9643 PUBLISHED

The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis).

EPSS 0.92% · 75.8th percentile

Risk Scores

EPSS Score
0.92%
75.8th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSqtwebkit-opensource-src5.4.2+dfsg-1ubuntu2.1, 5.5.1+dfsg-2ubuntu1, 0
Ubuntu:24.04:LTSqtwebkit-opensource-src5.212.0~alpha4-36, 5.212.0~alpha4-34ubuntu4, 5.212.0~alpha4-34ubuntu3
Ubuntu:16.04:LTSwebkit2gtk2.10.4+dfsg1-1, 2.10.6-1, 2.10.6-1ubuntu1
Ubuntu:18.04:LTSwebkitgtk2.4.11-3, 0, 2.4.11-3ubuntu2
Ubuntu:18.04:LTSqtwebkit-opensource-src0, 5.9.1+dfsg-5ubuntu1, 5.9.1+dfsg-5ubuntu3
Ubuntu:16.04:LTSqtwebkit-source2.3.2-0ubuntu11, 0, 2.3.2-0ubuntu10
Ubuntu:16.04:LTSwebkitgtk2.4.11-0ubuntu0.1, 0, 2.4.9-2ubuntu2
Ubuntu:22.04:LTSqtwebkit-opensource-src5.212.0~alpha4-12, 0, 5.212.0~alpha4-13
Ubuntu:18.04:LTSqtwebkit-source2.3.2-0ubuntu13, 0
Ubuntu:20.04:LTSqtwebkit-opensource-src0, 5.212.0~alpha4-1, 5.212.0~alpha4-1ubuntu1

Timeline

References

Open in Interactive Console →