USN-5627-1

Source
https://ubuntu.com/security/notices/USN-5627-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5627-1.json
Related
Published
2022-09-22T08:11:36.580757Z
Modified
2022-09-22T08:11:36.580757Z
Details

It was discovered that PCRE incorrectly handled memory when handling certain regular expressions. An attacker could possibly use this issue to cause applications using PCRE to expose sensitive information.

References

Affected packages

Ubuntu:22.04:LTS / pcre2

Package

Name
pcre2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
10.39-3ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "libpcre2-32-0": "10.39-3ubuntu0.1",
            "libpcre2-dev": "10.39-3ubuntu0.1",
            "libpcre2-8-0": "10.39-3ubuntu0.1",
            "libpcre2-16-0": "10.39-3ubuntu0.1",
            "libpcre2-posix3": "10.39-3ubuntu0.1",
            "pcre2-utils": "10.39-3ubuntu0.1"
        }
    ]
}

Ubuntu:20.04:LTS / pcre2

Package

Name
pcre2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
10.34-7ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "libpcre2-posix2": "10.34-7ubuntu0.1",
            "libpcre2-32-0": "10.34-7ubuntu0.1",
            "libpcre2-dev": "10.34-7ubuntu0.1",
            "libpcre2-8-0": "10.34-7ubuntu0.1",
            "libpcre2-16-0": "10.34-7ubuntu0.1",
            "pcre2-utils": "10.34-7ubuntu0.1"
        }
    ]
}