CVE-2026-2903

Source
https://cve.org/CVERecord?id=CVE-2026-2903
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2903.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-2903
Downstream
Published
2026-02-22T01:16:00.563Z
Modified
2026-02-26T00:38:00.445472Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A flaw has been found in skvadrik re2c up to 4.4. Impacted is the function checkandmergespecialrules of the file src/parse/ast.cc. This manipulation causes null pointer dereference. The attack can only be executed locally. The exploit has been published and may be used. Patch name: febeb977936f9519a25d9fbd10ff8256358cdb97. It is suggested to install a patch to address this issue.

References

Affected packages

Git / github.com/skvadrik/re2c

Affected ranges

Type
GIT
Repo
https://github.com/skvadrik/re2c
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.13.6
0.13.7.1
0.13.7.2
0.13.7.3
0.13.7.4
0.13.7.5
0.14
0.14.1
0.14.2
0.14.3
0.15
0.15.1
0.15.2
0.15.3
0.16
1.*
1.0
1.0.1
1.0.2
1.0.3
1.1
1.1.1
1.2
1.2.1
1.3
2.*
2.0
2.0.1
2.0.2
2.0.3
2.1
2.1.1
2.2
3.*
3.0
3.1
4.*
4.0
4.0.1
4.0.2
4.1
4.2
4.3
4.3.1
4.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2903.json"
vanir_signatures
[
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "function_hash": "291586698837642700167099358298615316628",
            "length": 1962.0
        },
        "source": "https://github.com/skvadrik/re2c/commit/febeb977936f9519a25d9fbd10ff8256358cdb97",
        "signature_type": "Function",
        "id": "CVE-2026-2903-50985907",
        "target": {
            "file": "src/parse/ast.cc",
            "function": "check_and_merge_special_rules"
        }
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "51652395783220909632438727179018861303",
                "88507521459474349026850757608611613912",
                "11417266347209242241442601395639478243",
                "37449041676600533087540737702601212130",
                "220132697220520627608291557119638452585",
                "196033581757968595210306518800825857608",
                "99045384592536553511397574148745094117",
                "80096842499926482670328789496206509507",
                "80936037702368345783926879371942580424",
                "63190400494898379930819946684056161491"
            ]
        },
        "source": "https://github.com/skvadrik/re2c/commit/febeb977936f9519a25d9fbd10ff8256358cdb97",
        "signature_type": "Line",
        "id": "CVE-2026-2903-b050b559",
        "target": {
            "file": "src/parse/ast.cc"
        }
    },
    {
        "deprecated": false,
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "51061471588528320011066460877264252129"
            ]
        },
        "source": "https://github.com/skvadrik/re2c/commit/febeb977936f9519a25d9fbd10ff8256358cdb97",
        "signature_type": "Line",
        "id": "CVE-2026-2903-e8921685",
        "target": {
            "file": "test/conditions/cond_error_10.c"
        }
    }
]