Multiple out-of-bounds read vulnerabilities were found in pcre2, a Perl Compatible Regular Expression library, which could result in information disclosure or denial or service.
\X
is JIT
compiled and used to match specially crafted subjects in non-UTF
mode.This upload also fixes a subject buffer overread in JIT when UTF is
disabled and \X
or \R
has a greater
than 1 fixed quantifier. This issue was found by Yunho Kim.
For Debian 10 buster, these problems have been fixed in version 10.32-5+deb10u1.
We recommend that you upgrade your pcre2 packages.
For the detailed security status of pcre2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/pcre2
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS