Search for packages
| purl | pkg:deb/debian/pcre2@10.32-5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-n3na-8bf2-r3gv
Aliases: CVE-2022-1587 |
Out-of-bounds Read An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers. |
Affected by 1 other vulnerability. |
|
VCID-nhna-bk28-t3ex
Aliases: CVE-2022-1586 |
Out-of-bounds Read An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT. |
Affected by 1 other vulnerability. |
|
VCID-sqxs-v4xg-5kd8
Aliases: CVE-2019-20454 |
A vulnerability in PCRE2 could lead to a Denial of Service condition. |
Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-hvre-wgyt-23dz | Improper Restriction of Operations within the Bounds of a Memory Buffer pcre2test.c in PCRE2 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression. |
CVE-2017-8786
|