RLSA-2021:4373

Source
https://errata.rockylinux.org/RLSA-2021:4373
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2021:4373.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2021:4373
Related
Published
2021-11-09T09:12:45Z
Modified
2023-02-02T12:51:59.333676Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Low: pcre security update
Details

PCRE is a Perl-compatible regular expression library.

Security Fix(es):

  • pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838)

  • pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / pcre

Package

Name
pcre
Purl
pkg:rpm/rocky-linux/pcre?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:8.42-6.el8