The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis).
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_name": "gir1.2-javascriptcoregtk-4.0", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "gir1.2-webkit2-4.0", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libjavascriptcoregtk-4.0-18", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libjavascriptcoregtk-4.0-18-dbgsym", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libjavascriptcoregtk-4.0-bin", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libjavascriptcoregtk-4.0-bin-dbgsym", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libjavascriptcoregtk-4.0-dev", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libwebkit2gtk-4.0-37", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libwebkit2gtk-4.0-37-dbgsym", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libwebkit2gtk-4.0-37-gtk2", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libwebkit2gtk-4.0-37-gtk2-dbgsym", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libwebkit2gtk-4.0-dev", "binary_version": "2.16.1-0ubuntu0.16.04.1" }, { "binary_name": "libwebkit2gtk-4.0-doc", "binary_version": "2.16.1-0ubuntu0.16.04.1" } ] }