An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in doextuninoutf in pcre2jit_compile.c.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "10.34-7", "binary_name": "libpcre2-16-0" }, { "binary_version": "10.34-7", "binary_name": "libpcre2-16-0-dbgsym" }, { "binary_version": "10.34-7", "binary_name": "libpcre2-32-0" }, { "binary_version": "10.34-7", "binary_name": "libpcre2-32-0-dbgsym" }, { "binary_version": "10.34-7", "binary_name": "libpcre2-8-0" }, { "binary_version": "10.34-7", "binary_name": "libpcre2-8-0-dbgsym" }, { "binary_version": "10.34-7", "binary_name": "libpcre2-8-0-udeb" }, { "binary_version": "10.34-7", "binary_name": "libpcre2-dev" }, { "binary_version": "10.34-7", "binary_name": "libpcre2-posix2" }, { "binary_version": "10.34-7", "binary_name": "libpcre2-posix2-dbgsym" }, { "binary_version": "10.34-7", "binary_name": "pcre2-utils" }, { "binary_version": "10.34-7", "binary_name": "pcre2-utils-dbgsym" } ] }