Lucene search

K
mageiaGentoo FoundationMGASA-2020-0305
HistoryAug 01, 2020 - 2:25 a.m.

Updated pcre2 packages fix security vulnerability

2020-08-0102:25:42
Gentoo Foundation
advisories.mageia.org
66

0.002 Low

EPSS

Percentile

51.3%

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c. (CVE-2019-20454)

OSVersionArchitecturePackageVersionFilename
Mageia7noarchpcre2< 10.33-1.2pcre2-10.33-1.2.mga7