Search for packages
| purl | pkg:deb/debian/pcre2@10.46-1~deb13u1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-3vg3-y6dk-n3ag | Multiple vulnerabilities have been found in libpcre, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition. |
CVE-2016-1283
|
| VCID-eq8x-wkjr-zyf7 | Improper Restriction of Operations within the Bounds of a Memory Buffer PCRE2 has an out-of-bounds write caused by a stack-based buffer overflow in pcre2_match.c, related to a "pattern with very many captures." |
CVE-2017-8399
|
| VCID-hmzr-t319-kybz | pcre2: PCRE2: heap-buffer-overflow read in match_ref due to missing boundary restoration in SCS |
CVE-2025-58050
|
| VCID-hvre-wgyt-23dz | Improper Restriction of Operations within the Bounds of a Memory Buffer pcre2test.c in PCRE2 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression. |
CVE-2017-8786
|
| VCID-n3na-8bf2-r3gv | Out-of-bounds Read An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers. |
CVE-2022-1587
|
| VCID-nhna-bk28-t3ex | Out-of-bounds Read An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT. |
CVE-2022-1586
|
| VCID-puhw-2qwq-gqet | Integer Overflow or Wraparound Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input. |
CVE-2022-41409
|
| VCID-sqxs-v4xg-5kd8 | A vulnerability in PCRE2 could lead to a Denial of Service condition. |
CVE-2019-20454
|
| VCID-udse-25e2-vfeb | Improper Restriction of Operations within the Bounds of a Memory Buffer The compile_branch function in pcre_compile.c in PCRE and pcre2_compile.c in PCRE2 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542. |
CVE-2016-3191
|
| VCID-va26-j6rt-buab | Multiple vulnerabilities have been found in libpcre, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition. |
CVE-2015-8380
|
| VCID-ywee-ghvk-pubu | Improper Restriction of Operations within the Bounds of a Memory Buffer libpcre1 in PCRE and libpcre2 in PCRE2 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup. |
CVE-2017-7186
|