pcre2 security update addressing out-of-bounds read vulnerabilitie
Reporter | Title | Published | Views | Family All 183 |
---|---|---|---|---|
![]() | Moderate: pcre2 security update | 28 Jun 202208:27 | – | osv |
![]() | pcre2 vulnerabilities | 22 Sep 202208:11 | – | osv |
![]() | RHSA-2022:5251 Red Hat Security Advisory: pcre2 security update | 16 Sep 202408:14 | – | osv |
![]() | pcre2 vulnerabilities | 22 Sep 202213:45 | – | osv |
![]() | pcre2 - security update | 16 Mar 202300:00 | – | osv |
![]() | CGA-CH3W-QW3C-39P3 | 6 Jun 202412:25 | – | osv |
![]() | RHSA-2022:5809 Red Hat Security Advisory: pcre2 security update | 16 Sep 202408:09 | – | osv |
![]() | Moderate: pcre2 security update | 3 Aug 202200:00 | – | osv |
![]() | Moderate: pcre2 security update | 2 Aug 202206:58 | – | osv |
![]() | CVE-2022-1587 | 16 May 202221:15 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 9 | ppc64le | pcre2-utf32-debuginfo | 10.37-5.el9_0 | pcre2-utf32-debuginfo-10.37-5.el9_0.ppc64le.rpm |
RedHat | 9 | i686 | pcre2-debugsource | 10.37-5.el9_0 | pcre2-debugsource-10.37-5.el9_0.i686.rpm |
RedHat | 9 | i686 | pcre2-utf16-debuginfo | 10.37-5.el9_0 | pcre2-utf16-debuginfo-10.37-5.el9_0.i686.rpm |
RedHat | 9 | x86_64 | pcre2-devel | 10.37-5.el9_0 | pcre2-devel-10.37-5.el9_0.x86_64.rpm |
RedHat | 9 | i686 | pcre2-devel | 10.37-5.el9_0 | pcre2-devel-10.37-5.el9_0.i686.rpm |
RedHat | 9 | noarch | pcre2-syntax | 10.37-5.el9_0 | pcre2-syntax-10.37-5.el9_0.noarch.rpm |
RedHat | 9 | x86_64 | pcre2-utf32 | 10.37-5.el9_0 | pcre2-utf32-10.37-5.el9_0.x86_64.rpm |
RedHat | 9 | aarch64 | pcre2-utf16-debuginfo | 10.37-5.el9_0 | pcre2-utf16-debuginfo-10.37-5.el9_0.aarch64.rpm |
RedHat | 9 | i686 | pcre2-utf16 | 10.37-5.el9_0 | pcre2-utf16-10.37-5.el9_0.i686.rpm |
RedHat | 9 | x86_64 | pcre2-utf16-debuginfo | 10.37-5.el9_0 | pcre2-utf16-debuginfo-10.37-5.el9_0.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo